diff --git a/graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43e31ada3b44db2a657557ee70aac2e671c667b2 --- /dev/null +++ b/graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.232 + 100.64.41.232 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715276235 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c69d0810-0e2a-11ef-801a-2fb46581ffa8 + + + diff --git a/graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b4104fed622d5c7fed2bfe6f1b0ac8ad0c03971 --- /dev/null +++ b/graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.206 + 100.64.46.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1704373461 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ba51759a10e60f7cc844010a1c6c11a3289d74a --- /dev/null +++ b/graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.41 + 100.64.27.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713090097 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6a8e1d0-fa48-11ee-a230-bfe539a81cf2 + + + diff --git a/graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ba4ce7b2ce7ddaa1e0dd5c6af42db47f197e9ea --- /dev/null +++ b/graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.203 + 100.64.10.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.223 + 100.64.13.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.39 + 100.64.7.39 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689837573 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6acf940-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837573 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6acf940-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837573 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6acf940-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837573 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6acf940-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837573 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6acf940-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837573 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6acf940-26cd-11ee-863d-83828757c718 + + + diff --git a/graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aefd07e474e897c95db95c1aac4dcee438b01ca0 --- /dev/null +++ b/graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.161 + 100.64.23.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bcab5a4253daab487686feeed427bb0fdf1da382 --- /dev/null +++ b/graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.46.206 + 100.64.46.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1704373461 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4db3e23c23dd7c32821024fc29a31629a357543c --- /dev/null +++ b/graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.234 + 100.64.41.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715276235 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6bf3610-0e2a-11ef-801a-2fb46581ffa8 + + + diff --git a/graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1dd5d5c634b24341728381e829f95f602f23457d --- /dev/null +++ b/graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.233 + 100.64.76.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.51 + 100.64.72.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688714869 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6dc4d70-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714869 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6dc4d70-1c97-11ee-b9c1-8f183b2e0424 + + + diff --git a/graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37c9534ccfbee30e6c0f5b86b08d430e911ab901 --- /dev/null +++ b/graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.142 + 100.64.15.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714908157 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f1c230-0ad1-11ef-8694-dbcc61061be0 + + + diff --git a/graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1389c563b1ed5c6d51ed6fbbbf1640a732706a2 --- /dev/null +++ b/graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.45 + 100.64.40.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.195 + 100.64.73.195 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.48.254 + 100.64.48.254 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.64.154 + 100.64.64.154 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688714869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6f1f850-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6f1f850-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6f1f850-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6f1f850-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6f1f850-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6f1f850-1c97-11ee-b9c1-8f183b2e0424 + + + diff --git a/graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f31fa4d6958a1fc46443d48c7515f8086b02f395 --- /dev/null +++ b/graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.169 + 100.64.80.169 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688490243 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6f59170-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490243 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6f59170-1a8c-11ee-a9ef-735ae64b5bd4 + + + diff --git a/graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdc04104d851a8bbbf82ee8af33d2ce358863836 --- /dev/null +++ b/graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml @@ -0,0 +1,785 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.33 + 100.64.10.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.34 + 100.64.10.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.35 + 100.64.10.35 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.36 + 100.64.10.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.30 + 100.64.10.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.37 + 100.64.10.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.38 + 100.64.10.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.39 + 100.64.10.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.40 + 100.64.10.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.41 + 100.64.10.41 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.42 + 100.64.10.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.43 + 100.64.10.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.44 + 100.64.10.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.45 + 100.64.10.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.48 + 100.64.10.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.49 + 100.64.10.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.50 + 100.64.10.50 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6f8acf0-df14-11ee-9778-4184b1db151c + + + diff --git a/graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1d9bbfbb6339d28796feb5cc6cc95d84f31629a --- /dev/null +++ b/graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.92 + 100.64.88.92 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1676271920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6fa8d40-ab6c-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e27f8a69dbbb92ce4609ab62e61f4db3ec9b84e2 --- /dev/null +++ b/graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.92 + 100.64.88.92 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676271920 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6ff4830-ab6c-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63f4725646390e003627dc41cf920805a1b57fc8 --- /dev/null +++ b/graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.78 + 100.64.30.78 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959925 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7167d60-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7bac0077d5eca18dda665e78c3035308a8504e42 --- /dev/null +++ b/graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.15 + 100.64.31.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.67 + 100.64.72.67 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686964241 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c721b500-0cab-11ee-8985-55bb832fcc7f + + + diff --git a/graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a4663c774855b657b9ff43127d59e70a0a91676 --- /dev/null +++ b/graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.36.227 + 192.168.36.227 + [] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 10.110.41.138 + 10.110.41.138 + [] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370462 + malicious + 0.7 + 0.4375 + Data Theft + ["T1041","T1567"] + ["TA0009","TA0010"] + [] + complete-mission + Disrupted + c72f7f50-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370462 + malicious + 0.7 + 0.4375 + Data Theft + ["T1041","T1567"] + ["TA0009","TA0010"] + [] + complete-mission + Disrupted + c72f7f50-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d7987add9666112edb99769b09244d1cd13a642 --- /dev/null +++ b/graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml @@ -0,0 +1,169 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.72 + 100.64.69.72 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.73 + 100.64.69.73 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.325 + ["Precinct"] + + + HOST + 100.64.58.41 + 100.64.58.41 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690865789 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c7374510-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865789 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c7374510-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865789 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c7374510-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865789 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c7374510-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865789 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c7374510-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865789 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c7374510-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865789 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c7374510-3027-11ee-a433-a916fb2bb25a + + + diff --git a/graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b4a5c84cd8054e58684a06da8f772adad3bd409 --- /dev/null +++ b/graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.176 + 100.64.79.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370462 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c73b8d40-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370462 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c73b8d40-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25357e7c05aae4f804d9c486bbbc1c092a6fdcac --- /dev/null +++ b/graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.241 + 100.64.9.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.193 + 100.64.12.193 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690711171 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c74122b0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711171 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c74122b0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711171 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c74122b0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711171 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c74122b0-2ebf-11ee-9131-1117bdeaaaa3 + + + diff --git a/graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ecef143fbd7621b93bf547b9f02dd4f2791c9a3 --- /dev/null +++ b/graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.243 + 100.64.78.243 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688357958 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7418380-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2cd5153dcbd1ac10b8210d7f53566d56e74aa47d --- /dev/null +++ b/graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.67 + 100.64.72.67 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.31.15 + 100.64.31.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686964241 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c746f040-0cab-11ee-8985-55bb832fcc7f + + + diff --git a/graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89fbe78530ee3a0e03e6f13b1fb8078264d1623a --- /dev/null +++ b/graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.69 + 100.64.43.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585363 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c74f67b0-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90261e412e7647159d6fa81a18b8bdc27576b9d5 --- /dev/null +++ b/graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.181 + 100.64.2.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.107 + 100.64.20.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721126411 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c74f6cc0-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126411 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c74f6cc0-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126411 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c74f6cc0-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126411 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c74f6cc0-435f-11ef-9e66-fd84d5bf3736 + + + diff --git a/graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5fc1b2af02f3d1b29dd5e772a76017d7e2b7f099 --- /dev/null +++ b/graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.201 + 100.64.71.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688357958 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c75a62b0-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbb5174ffeb3bc5554ee6256d7c1c0dc8732f01f --- /dev/null +++ b/graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.75 + USER-0015-2143.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + HOST-18911 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1704373462 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08f91050f5f9e9b48fc52a902ff45f9ad555c3db --- /dev/null +++ b/graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721126411 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c764f090-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126411 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c764f090-435f-11ef-9e66-fd84d5bf3736 + + + diff --git a/graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb48a0f6df57a0a4d75de9a66e52e4c370da3c84 --- /dev/null +++ b/graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.93 + 100.64.71.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1673881342 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c767f340-95ae-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673881342 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c767f340-95ae-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39d05a2eeb931a96bdf3be42a10009cd75087f83 --- /dev/null +++ b/graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + HOST-18911 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.17.75 + USER-0015-2143.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704373462 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c7778580-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0827176836509592462679d4d649fccc99d34b7c --- /dev/null +++ b/graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.210 + 100.64.72.210 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.211 + 100.64.72.211 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.212 + 100.64.72.212 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.125 + 100.64.71.125 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.213 + 100.64.72.213 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.49 + 100.64.72.49 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.7.71 + 100.64.7.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.214 + 100.64.72.214 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.38.41 + 100.64.38.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.50.138 + USER-0015-1641.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.216 + 100.64.72.216 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.217 + 100.64.72.217 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.218 + 100.64.72.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.39.224 + 100.64.39.224 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7781df0-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c38c4e08dcfd6088b044f4166581efc055b6363 --- /dev/null +++ b/graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.201 + 100.64.71.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688357959 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c779f8a0-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5378b42824991799b376a8df546e2e99dca19ebc --- /dev/null +++ b/graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.20.130.86 + 172.20.130.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.92.70 + 100.64.92.70 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718052933 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c788a5e0-276b-11ef-b363-fdc4064c84e0 + + + INCIDENT_LINK + 1718052933 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c788a5e0-276b-11ef-b363-fdc4064c84e0 + + + diff --git a/graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9416453d1cbd5ebfa5437fb55d7647439a436dc --- /dev/null +++ b/graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.141 + 100.64.86.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675134184 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7892d60-a113-11ed-b936-1349c6e38dc6 + + + diff --git a/graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96dce959c42f31b962f42f784720c27394c004bd --- /dev/null +++ b/graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.222 + 100.64.95.222 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1704373462 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c78c9420-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e791ffa2931595bbdb2bf6b6f3256d5bbd5ff07 --- /dev/null +++ b/graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.86.141 + 100.64.86.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675134184 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c78e8490-a113-11ed-b936-1349c6e38dc6 + + + diff --git a/graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml b/graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f0e32808adc9ec51ff18233aedf8a9039f6de14 --- /dev/null +++ b/graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.187 + 100.64.9.187 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1701115300 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7a0fc90-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115300 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7a0fc90-8d5f-11ee-9951-411438339097 + + + diff --git a/graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc9474edddc0d849a38e66918a59d3420cdb5375 --- /dev/null +++ b/graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.95.222 + 100.64.95.222 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704373462 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36ad825d640428543763e8175cfbe6ba9157f69c --- /dev/null +++ b/graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.244 + 100.64.78.244 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688357959 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7a91ef0-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a4f50cd19f135b139e9cbb53369ce2f2d820644 --- /dev/null +++ b/graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.10.137 + 172.18.10.137 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.85.108 + 100.64.85.108 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661712411 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7b0b290-2701-11ed-bc1f-0928ad8774f3 + + + INCIDENT_LINK + 1661712411 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7b0b290-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..013d03fd6cd6080dd397ec98142d28490cf46f4a --- /dev/null +++ b/graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.248 + 100.64.17.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.94.161 + USER-0015-2120.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714983320 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7b63020-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983320 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7b63020-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983320 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7b63020-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983320 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7b63020-0b80-11ef-b87c-0d8b17cd9fbf + + + diff --git a/graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml new file mode 100644 index 0000000000000000000000000000000000000000..649a69a71f4501cf62295edb58b514dcab97b25d --- /dev/null +++ b/graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.21 + 100.64.73.21 + ["Exploiting Host","Exploiting Target"] + 0.930390625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.81 + 100.64.82.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.82 + 100.64.82.82 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.83 + 100.64.82.83 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.103 + 100.64.77.103 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.51 + 100.64.73.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.84 + 100.64.82.84 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.118 + 100.64.72.118 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.85 + 100.64.82.85 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.86 + 100.64.82.86 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.238 + 100.64.71.238 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.87 + 100.64.82.87 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.88 + 100.64.82.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.89 + 100.64.82.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.90 + 100.64.82.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.73 + 100.64.72.73 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.91 + 100.64.82.91 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.92 + 100.64.82.92 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125026 + malicious + 0.930390625 + 0.930390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7b6da90-33da-11ed-bcaf-e3fcd610a254 + + + diff --git a/graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f220ed292c9903fc360574b3f123543d0e9c31f5 --- /dev/null +++ b/graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.233.197 + 192.168.233.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.203 + 100.64.72.203 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686356934 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7d05e10-0725-11ee-9ff8-05edc9624e6c + + + INCIDENT_LINK + 1686356934 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7d05e10-0725-11ee-9ff8-05edc9624e6c + + + diff --git a/graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f390da4064c9e9bdf7b2a5a4b05f8726ffe50bc8 --- /dev/null +++ b/graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.244 + 100.64.78.244 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688357959 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7d0cb30-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9ebfe847ed1df68563c28fec27e0a8d2cb05567 --- /dev/null +++ b/graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.187 + 100.64.18.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698307251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7e05460-73d5-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1eb81a285bba695405e8b7c3575e3aea26f66f2 --- /dev/null +++ b/graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.31 + 100.64.54.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959927 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c7e0f950-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ad138dd189533557c9452d2a04ae25cfc8986fe --- /dev/null +++ b/graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692324791 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7e17d30-3d6c-11ee-b209-c721199fad49 + + + diff --git a/graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b306d08b2da4a8027a624c1d800a99dcf22674d --- /dev/null +++ b/graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.245 + 100.64.78.245 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688357959 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7e4c860-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb46cc290d8b583c527d27ac15523a9810911910 --- /dev/null +++ b/graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.50 + 100.64.57.50 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695195977 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c7e82540-5789-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml b/graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e11181e5533185a4524be429ab929fb96406e0b8 --- /dev/null +++ b/graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.115 + 100.64.68.115 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.1.109 + USER-0015-1627.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657803132 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7ea0b00-0373-11ed-8991-41244357ae3d + + + INCIDENT_LINK + 1657803132 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7ea0b00-0373-11ed-8991-41244357ae3d + + + diff --git a/graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bcd9c1be582f52305a3a9dd5b0dda1b6df5ba89 --- /dev/null +++ b/graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.187 + 100.64.18.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698307251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7f16b60-73d5-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/c/c7f878f0-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c7f878f0-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94902ac967f65c294f023282913c4ae15cc8aed7 --- /dev/null +++ b/graph/incidents_graphml/c/c7f878f0-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.31 + 100.64.54.31 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959927 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7f878f0-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c7fa5010-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/c/c7fa5010-a0fb-11ee-b868-0b39d8f52622.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e101459791a4a8d96b90f8ab90b762c189d8686e --- /dev/null +++ b/graph/incidents_graphml/c/c7fa5010-a0fb-11ee-b868-0b39d8f52622.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.194 + 100.64.14.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703271374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7fa5010-a0fb-11ee-b868-0b39d8f52622 + + + diff --git a/graph/incidents_graphml/c/c7fd9480-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c7fd9480-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a47003f06a3cac3d3627da38a71b0c14b498762 --- /dev/null +++ b/graph/incidents_graphml/c/c7fd9480-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.137 + 100.64.66.137 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826873 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c7fd9480-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c7feff50-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/c/c7feff50-a4a5-11ed-b478-67badd244434.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14ef0374f8a622613224691c6e662380015fc40b --- /dev/null +++ b/graph/incidents_graphml/c/c7feff50-a4a5-11ed-b478-67badd244434.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.240 + 100.64.71.240 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.82.148 + 100.64.82.148 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1675526745 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7feff50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526745 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7feff50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526745 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7feff50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526745 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c7feff50-a4a5-11ed-b478-67badd244434 + + + diff --git a/graph/incidents_graphml/c/c7ff4e10-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c7ff4e10-73d5-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3075ef6440a2820692e01f46dc84ee4a1a1d12b6 --- /dev/null +++ b/graph/incidents_graphml/c/c7ff4e10-73d5-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.20 + 100.64.67.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698307251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c7ff4e10-73d5-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/c/c80711f0-9c1b-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/c/c80711f0-9c1b-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2331796146fa396c20c26d007c8fc9bd0bc7858 --- /dev/null +++ b/graph/incidents_graphml/c/c80711f0-9c1b-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.187 + 100.64.71.187 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1674587865 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c80711f0-9c1b-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/c/c8096760-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c8096760-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2952855a6192482269a2872b64a936c5554c83a1 --- /dev/null +++ b/graph/incidents_graphml/c/c8096760-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.245 + 100.64.78.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688357960 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8096760-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c8096b40-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/c/c8096b40-a0fb-11ee-b868-0b39d8f52622.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c581f9c2d9da88fff2ba099fe62b7a4be773d0b --- /dev/null +++ b/graph/incidents_graphml/c/c8096b40-a0fb-11ee-b868-0b39d8f52622.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.194 + 100.64.14.194 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703271374 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8096b40-a0fb-11ee-b868-0b39d8f52622 + + + diff --git a/graph/incidents_graphml/c/c80d30c0-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c80d30c0-73d5-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..086c52a83e49b4caef59514b2ab842d7ba5bf0cd --- /dev/null +++ b/graph/incidents_graphml/c/c80d30c0-73d5-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.20 + 100.64.67.20 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698307251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c80d30c0-73d5-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/c/c80eab80-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c80eab80-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..180e17ad285cb6298e2cad4bbaa4c15d4afe36ca --- /dev/null +++ b/graph/incidents_graphml/c/c80eab80-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.139 + 100.64.66.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c80eab80-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c80f3540-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c80f3540-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eaaffb0f4e3169d5b0b78d86acc273ade2fb71b8 --- /dev/null +++ b/graph/incidents_graphml/c/c80f3540-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.148 + 100.64.14.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959927 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c80f3540-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c811b050-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/c811b050-8c0d-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44fdc41f190e8378d830abcd531016f19dbab544 --- /dev/null +++ b/graph/incidents_graphml/c/c811b050-8c0d-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.71 + 100.64.7.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700970131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c811b050-8c0d-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/c/c81676b0-ea51-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/c/c81676b0-ea51-11ee-a5b0-ebb549372bba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be899a93b5fadc279ded7ff706a2edbbae9a4e4c --- /dev/null +++ b/graph/incidents_graphml/c/c81676b0-ea51-11ee-a5b0-ebb549372bba.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.43 + 100.64.55.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","CASB","Protect"] + + + INCIDENT_LINK + 1711334746 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c81676b0-ea51-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711334746 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c81676b0-ea51-11ee-a5b0-ebb549372bba + + + diff --git a/graph/incidents_graphml/c/c81f7460-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c81f7460-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57476aa047a9daa104335646b674cd9f06896678 --- /dev/null +++ b/graph/incidents_graphml/c/c81f7460-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.139 + 100.64.66.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c81f7460-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c8270d10-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/c8270d10-8c0d-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3faf4a1011ac5b1949f72773455515170ae8dc2 --- /dev/null +++ b/graph/incidents_graphml/c/c8270d10-8c0d-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,677 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.192 + 100.64.16.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.193 + 100.64.16.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.194 + 100.64.16.194 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.195 + 100.64.16.195 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.230 + 100.64.10.230 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.196 + 100.64.16.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.197 + 100.64.16.197 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.198 + 100.64.16.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.251 + 100.64.13.251 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.199 + 100.64.16.199 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.200 + 100.64.16.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.201 + 100.64.16.201 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.202 + 100.64.16.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.190 + 100.64.16.190 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.203 + 100.64.16.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700970131 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8270d10-8c0d-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/c/c827c650-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c827c650-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f605d58d32c47a73bb481b4304b8225666ed8ddf --- /dev/null +++ b/graph/incidents_graphml/c/c827c650-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.148 + 100.64.14.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959927 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c827c650-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c82837e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c82837e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5357dfccf73ca816de53ec53982fa5986131c52a --- /dev/null +++ b/graph/incidents_graphml/c/c82837e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.224 + 100.64.95.224 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1704373463 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c82837e0-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c82ed320-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/c82ed320-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c247d76081c856272770d4e5d80e02ee1bbffb12 --- /dev/null +++ b/graph/incidents_graphml/c/c82ed320-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.191 + 100.64.19.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695779234 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c82ed320-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/c/c8353250-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c8353250-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0569e77532b40ea849409a8cd9b1e221f8e8a168 --- /dev/null +++ b/graph/incidents_graphml/c/c8353250-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.142 + 100.64.76.142 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688357960 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8353250-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c8369360-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c8369360-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2a362215b061d3a89558bf55d4c19f69c475344 --- /dev/null +++ b/graph/incidents_graphml/c/c8369360-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.157 + 100.64.47.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959927 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8369360-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c8371a00-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/c/c8371a00-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac06a2f7999a040cb586179d344b385c866f2333 --- /dev/null +++ b/graph/incidents_graphml/c/c8371a00-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,93 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.3 + 100.64.25.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.128 + 100.64.80.128 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.254 + 100.64.75.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.71 + 100.64.74.71 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687010199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8371a00-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8371a00-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/c/c8399d00-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c8399d00-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f478818a16579560afe4ea339fe4079acf7ebc4b --- /dev/null +++ b/graph/incidents_graphml/c/c8399d00-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.95.224 + 100.64.95.224 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704373463 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c8399d00-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c83aa310-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c83aa310-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60a37cd8d6d01b478cdada93cb3be15a400af565 --- /dev/null +++ b/graph/incidents_graphml/c/c83aa310-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.112.183 + 172.16.112.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.214 + 100.64.90.214 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.215 + 100.64.90.215 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661712412 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c83aa310-2701-11ed-bc1f-0928ad8774f3 + + + INCIDENT_LINK + 1661712412 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c83aa310-2701-11ed-bc1f-0928ad8774f3 + + + INCIDENT_LINK + 1661712412 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c83aa310-2701-11ed-bc1f-0928ad8774f3 + + + INCIDENT_LINK + 1661712412 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c83aa310-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c83ba230-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c83ba230-276b-11ef-b363-fdc4064c84e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf9d2141492352325b0c1e54a9e1839594f760a1 --- /dev/null +++ b/graph/incidents_graphml/c/c83ba230-276b-11ef-b363-fdc4064c84e0.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.23 + 100.64.28.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1718052934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c83ba230-276b-11ef-b363-fdc4064c84e0 + + + INCIDENT_LINK + 1718052934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c83ba230-276b-11ef-b363-fdc4064c84e0 + + + diff --git a/graph/incidents_graphml/c/c83ba460-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/c83ba460-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3efc72520876494ccfad7a84807f5cc1e186d54 --- /dev/null +++ b/graph/incidents_graphml/c/c83ba460-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.19.191 + 100.64.19.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695779234 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c83ba460-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/c/c83d93d0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c83d93d0-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..738803bd584dcf4606363cc6282bb39ef7091cf9 --- /dev/null +++ b/graph/incidents_graphml/c/c83d93d0-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.120 + 100.64.64.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172854 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c83d93d0-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c83efca0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c83efca0-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8b238035406ff41314ca912cb30fc8227908b0c --- /dev/null +++ b/graph/incidents_graphml/c/c83efca0-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.42 + 100.64.78.42 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.12 + 100.64.77.12 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660528290 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c83efca0-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528290 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c83efca0-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/c/c84032a0-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c84032a0-a166-11ed-863f-a161c6cf34a1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd0782c24ab912f6e2aaf28da70970498c2821dd --- /dev/null +++ b/graph/incidents_graphml/c/c84032a0-a166-11ed-863f-a161c6cf34a1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.213 + 100.64.86.213 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675169833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c84032a0-a166-11ed-863f-a161c6cf34a1 + + + diff --git a/graph/incidents_graphml/c/c84194b0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c84194b0-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40b4c917caafa3421abdc3db10d0c7a39880b751 --- /dev/null +++ b/graph/incidents_graphml/c/c84194b0-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.43 + 100.64.78.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.159 + 100.64.1.159 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660528290 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c84194b0-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528290 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c84194b0-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/c/c8442a40-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c8442a40-a166-11ed-863f-a161c6cf34a1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6e8a6f4bb57933bdff960a4984e2cdc04cf0a20 --- /dev/null +++ b/graph/incidents_graphml/c/c8442a40-a166-11ed-863f-a161c6cf34a1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.86.213 + 100.64.86.213 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675169833 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8442a40-a166-11ed-863f-a161c6cf34a1 + + + diff --git a/graph/incidents_graphml/c/c848e2e0-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c848e2e0-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c4313d727f2b7f3632c9423409118fba362a252 --- /dev/null +++ b/graph/incidents_graphml/c/c848e2e0-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.157 + 100.64.47.157 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959927 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c848e2e0-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c84d2f30-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c84d2f30-0725-11ee-9ff8-05edc9624e6c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11ca1a616529d824b78b6e6b1b88622aab210d91 --- /dev/null +++ b/graph/incidents_graphml/c/c84d2f30-0725-11ee-9ff8-05edc9624e6c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.204 + 100.64.72.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686356935 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c84d2f30-0725-11ee-9ff8-05edc9624e6c + + + diff --git a/graph/incidents_graphml/c/c8511340-9c1b-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/c/c8511340-9c1b-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6512038073e77b5141135d0d791ba6bf9f5baac2 --- /dev/null +++ b/graph/incidents_graphml/c/c8511340-9c1b-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.2 + 100.64.79.2 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1674587865 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8511340-9c1b-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/c/c8553d70-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c8553d70-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbf59605abc1c8c44b403babce32132a136934c9 --- /dev/null +++ b/graph/incidents_graphml/c/c8553d70-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.142 + 100.64.76.142 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688357960 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8553d70-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c8555900-9c1b-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/c/c8555900-9c1b-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e70c3cfa7319a9a57d3c6a6cb0a78029a07d1a1 --- /dev/null +++ b/graph/incidents_graphml/c/c8555900-9c1b-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.79.2 + 100.64.79.2 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1674587865 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8555900-9c1b-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/c/c858df40-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c858df40-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5420701f9bf0077a94992cf897d5d1d0d4286c5b --- /dev/null +++ b/graph/incidents_graphml/c/c858df40-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.190 + 100.64.38.190 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c858df40-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/c85f02f0-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c85f02f0-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac3e1c8087ad4e89b4ca3059dc42f2bd59d18ae9 --- /dev/null +++ b/graph/incidents_graphml/c/c85f02f0-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.177 + 100.64.8.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959928 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c85f02f0-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c86247e0-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/c86247e0-170a-11ee-9198-135231c2dce9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96fcb2b14267aa7dba55982871777a9dda926c0f --- /dev/null +++ b/graph/incidents_graphml/c/c86247e0-170a-11ee-9198-135231c2dce9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.27 + 100.64.21.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688104557 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86247e0-170a-11ee-9198-135231c2dce9 + + + diff --git a/graph/incidents_graphml/c/c8641290-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c8641290-0725-11ee-9ff8-05edc9624e6c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72a4a67ec303184ade6e410c416fb74bc72153c3 --- /dev/null +++ b/graph/incidents_graphml/c/c8641290-0725-11ee-9ff8-05edc9624e6c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.204 + 100.64.72.204 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686356935 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8641290-0725-11ee-9ff8-05edc9624e6c + + + diff --git a/graph/incidents_graphml/c/c868a5a0-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c868a5a0-276b-11ef-b363-fdc4064c84e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5523924d1b41539ee8c910839e516fc2d99c1dfe --- /dev/null +++ b/graph/incidents_graphml/c/c868a5a0-276b-11ef-b363-fdc4064c84e0.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.89.242 + 172.23.89.242 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.92.71 + 100.64.92.71 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"] + + + HOST + 100.64.92.72 + 100.64.92.72 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718052934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c868a5a0-276b-11ef-b363-fdc4064c84e0 + + + INCIDENT_LINK + 1718052934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c868a5a0-276b-11ef-b363-fdc4064c84e0 + + + INCIDENT_LINK + 1718052934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c868a5a0-276b-11ef-b363-fdc4064c84e0 + + + diff --git a/graph/incidents_graphml/c/c869c000-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c869c000-3d6c-11ee-b209-c721199fad49.graphml new file mode 100644 index 0000000000000000000000000000000000000000..527ba1932e3f6eead5adb1b72ec3698a198ed649 --- /dev/null +++ b/graph/incidents_graphml/c/c869c000-3d6c-11ee-b209-c721199fad49.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.193 + 100.64.12.193 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692324792 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c869c000-3d6c-11ee-b209-c721199fad49 + + + diff --git a/graph/incidents_graphml/c/c86f2660-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c86f2660-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0d3dca5495d8de19549547b4b1e9123252d4872 --- /dev/null +++ b/graph/incidents_graphml/c/c86f2660-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.190 + 100.64.38.190 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169543 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c86f2660-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/c86fca50-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c86fca50-1958-11ee-b3de-e709a8260af8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..578615c80b06f138cf4eeaae65a3801ff295af6c --- /dev/null +++ b/graph/incidents_graphml/c/c86fca50-1958-11ee-b3de-e709a8260af8.graphml @@ -0,0 +1,825 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.248 + 100.64.78.248 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.220 + 100.64.72.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.86 + 100.64.73.86 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.249 + USER-0015-1798.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.130 + 100.64.72.130 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.18.143 + 100.64.18.143 + ["Exploiting Target","Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki"] + + + HOST + 100.64.24.248 + 100.64.24.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.243 + 100.64.71.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.82 + 100.64.73.82 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.231 + 100.64.10.231 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.250 + 100.64.78.250 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.116 + 100.64.72.116 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.251 + 100.64.78.251 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.13.183 + 100.64.13.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.25.3 + 100.64.25.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.209 + 100.64.72.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.7.119 + 100.64.7.119 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.252 + 100.64.78.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + INCIDENT_LINK + 1688357960 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c86fca50-1958-11ee-b3de-e709a8260af8 + + + diff --git a/graph/incidents_graphml/c/c87a0500-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c87a0500-ddd0-11ee-a342-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3935b226618d8953029cb9532397cbcc8cc42492 --- /dev/null +++ b/graph/incidents_graphml/c/c87a0500-ddd0-11ee-a342-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.177 + 100.64.8.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709959928 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c87a0500-ddd0-11ee-a342-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/c/c87fc710-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/c/c87fc710-45d2-11ee-b6a5-451a7dc3db0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..759f442c5c10ce6c7d6c36b1dbf89b7091589040 --- /dev/null +++ b/graph/incidents_graphml/c/c87fc710-45d2-11ee-b6a5-451a7dc3db0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.31 + 100.64.36.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693248210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c87fc710-45d2-11ee-b6a5-451a7dc3db0a + + + diff --git a/graph/incidents_graphml/c/c88b0750-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c88b0750-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9764668a37b0ee832ffb7e8cc0962e42c97b7750 --- /dev/null +++ b/graph/incidents_graphml/c/c88b0750-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.26 + 100.64.14.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c88b0750-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c8912c30-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/c/c8912c30-45d2-11ee-b6a5-451a7dc3db0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7bdda01d584163e61cfc61f5fac81bd5148ae52 --- /dev/null +++ b/graph/incidents_graphml/c/c8912c30-45d2-11ee-b6a5-451a7dc3db0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.36.31 + 100.64.36.31 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693248210 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8912c30-45d2-11ee-b6a5-451a7dc3db0a + + + diff --git a/graph/incidents_graphml/c/c89271b0-7135-11ee-bce1-87535eed5229.graphml b/graph/incidents_graphml/c/c89271b0-7135-11ee-bce1-87535eed5229.graphml new file mode 100644 index 0000000000000000000000000000000000000000..741c993580180cdb56cad7bc79947504546e3b9b --- /dev/null +++ b/graph/incidents_graphml/c/c89271b0-7135-11ee-bce1-87535eed5229.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.75 + 100.64.63.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698018630 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c89271b0-7135-11ee-bce1-87535eed5229 + + + diff --git a/graph/incidents_graphml/c/c89708a0-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c89708a0-276b-11ef-b363-fdc4064c84e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70b78fd942430a0efa1c8fca92fb9d6baa720ffa --- /dev/null +++ b/graph/incidents_graphml/c/c89708a0-276b-11ef-b363-fdc4064c84e0.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.78 + 100.64.92.78 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1718052935 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c89708a0-276b-11ef-b363-fdc4064c84e0 + + + INCIDENT_LINK + 1718052935 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c89708a0-276b-11ef-b363-fdc4064c84e0 + + + diff --git a/graph/incidents_graphml/c/c89c4560-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c89c4560-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e16d2926511b01c183233bab5f9a69e6cf238b22 --- /dev/null +++ b/graph/incidents_graphml/c/c89c4560-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.26 + 100.64.14.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363946 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c89c4560-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c89e33b0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/c89e33b0-285f-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59cb69200e6b88028bcf4ab1760b281b6fea7df5 --- /dev/null +++ b/graph/incidents_graphml/c/c89e33b0-285f-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.222 + 100.64.38.222 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718157732 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c89e33b0-285f-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/c/c8aa4f20-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c8aa4f20-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f0d0ac2c88443a4a6e9386ba8381215fa19b5d3 --- /dev/null +++ b/graph/incidents_graphml/c/c8aa4f20-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.30 + 100.64.14.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8aa4f20-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c8ad27d0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/c8ad27d0-285f-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b4d38791bd5a052667d7b8c6f35738cc4cb05af --- /dev/null +++ b/graph/incidents_graphml/c/c8ad27d0-285f-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,741 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.226 + 100.64.38.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.203 + 100.64.37.203 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.227 + 100.64.38.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.228 + 100.64.38.228 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.229 + 100.64.38.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.230 + 100.64.38.230 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.193 + 100.64.29.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.231 + 100.64.38.231 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.232 + 100.64.38.232 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.57 + 100.64.30.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.233 + 100.64.38.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.234 + 100.64.38.234 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.31 + 100.64.29.31 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.203 + 100.64.10.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.235 + 100.64.38.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.236 + 100.64.38.236 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718157732 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ad27d0-285f-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/c/c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/c/c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b4b2e10d75ce5ccd644df850ba9f74bc6b35620 --- /dev/null +++ b/graph/incidents_graphml/c/c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b.graphml @@ -0,0 +1,423 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.82 + 100.64.17.82 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.69 + 100.64.17.69 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.83 + 100.64.17.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.17.84 + 100.64.17.84 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.85 + 100.64.17.85 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.211 + 100.64.10.211 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.86 + 100.64.17.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.87 + 100.64.17.87 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.88 + 100.64.17.88 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.220 + 100.64.3.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b + + + diff --git a/graph/incidents_graphml/c/c8b30100-fbb9-11ee-947f-6184d270644d.graphml b/graph/incidents_graphml/c/c8b30100-fbb9-11ee-947f-6184d270644d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a8fae02ab1112718de79b8c1ca0b18df545fcc8 --- /dev/null +++ b/graph/incidents_graphml/c/c8b30100-fbb9-11ee-947f-6184d270644d.graphml @@ -0,0 +1,323 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.119 + 100.64.22.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.237 + 100.64.56.237 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.99 + 100.64.61.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.14 + 100.64.65.14 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.29 + 100.64.10.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.15 + 100.64.65.15 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.158 + 100.64.31.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8b30100-fbb9-11ee-947f-6184d270644d + + + diff --git a/graph/incidents_graphml/c/c8ba0690-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c8ba0690-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..557b5a109c3fe960ff40e905cbc43be812fabc0b --- /dev/null +++ b/graph/incidents_graphml/c/c8ba0690-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.30 + 100.64.14.30 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363946 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8ba0690-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/c/c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf89fca1eddd5164d1ff44f7cc787e922f96a9d6 --- /dev/null +++ b/graph/incidents_graphml/c/c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.96 + 100.64.17.96 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.97 + 100.64.17.97 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.50 + 100.64.9.50 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.98 + 100.64.17.98 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.60 + 100.64.13.60 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.99 + 100.64.17.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.100 + 100.64.17.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.101 + 100.64.17.101 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.102 + 100.64.17.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.103 + 100.64.17.103 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.149 + 100.64.10.149 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.104 + 100.64.17.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.105 + 100.64.17.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.106 + 100.64.17.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.107 + 100.64.17.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030269 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b + + + diff --git a/graph/incidents_graphml/c/c8ba35b0-082a-11ef-9432-0316676438e6.graphml b/graph/incidents_graphml/c/c8ba35b0-082a-11ef-9432-0316676438e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8ffe2b6789de4552a2e939f638e65fad1cb4c28 --- /dev/null +++ b/graph/incidents_graphml/c/c8ba35b0-082a-11ef-9432-0316676438e6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.20.181.243 + 172.20.181.243 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.97.163 + 100.64.97.163 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714616532 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba35b0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616532 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ba35b0-082a-11ef-9432-0316676438e6 + + + diff --git a/graph/incidents_graphml/c/c8bf2a10-1172-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/c/c8bf2a10-1172-11ef-98dd-db867c05f09b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7683dc384b6bcde2b89b05a939bcd9dbe3be408f --- /dev/null +++ b/graph/incidents_graphml/c/c8bf2a10-1172-11ef-98dd-db867c05f09b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.73.174 + 172.30.73.174 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.49 + 100.64.97.49 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715637016 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8bf2a10-1172-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637016 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8bf2a10-1172-11ef-98dd-db867c05f09b + + + diff --git a/graph/incidents_graphml/c/c8bf8a80-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8bf8a80-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7016c5530649a44b21d4ef23f4db02510735947 --- /dev/null +++ b/graph/incidents_graphml/c/c8bf8a80-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.216 + 100.64.90.216 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661712413 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8bf8a80-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c8c25270-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/c8c25270-182c-11ee-b591-f5bec484f8bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13098bfec84b0df1fb1454be6d0edbd818472538 --- /dev/null +++ b/graph/incidents_graphml/c/c8c25270-182c-11ee-b591-f5bec484f8bc.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.85 + 100.64.73.85 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.29.51 + 100.64.29.51 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688229112 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8c25270-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229112 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8c25270-182c-11ee-b591-f5bec484f8bc + + + diff --git a/graph/incidents_graphml/c/c8c49390-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8c49390-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fca69b6452beff3301a2bc80e33e86936d36bdc6 --- /dev/null +++ b/graph/incidents_graphml/c/c8c49390-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.216 + 100.64.90.216 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661712413 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8c49390-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c8cbb9d0-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c8cbb9d0-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae1a1e6593a5fe1396f530823b0464d3376db613 --- /dev/null +++ b/graph/incidents_graphml/c/c8cbb9d0-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.32 + 100.64.14.32 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8cbb9d0-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c8ccd0f0-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8ccd0f0-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d7ab3c0c000b9e8cb379ed347648d1829078c94 --- /dev/null +++ b/graph/incidents_graphml/c/c8ccd0f0-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.69.2 + 100.64.69.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661712413 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c8ccd0f0-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c8d9b610-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/c8d9b610-285f-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be98725def465c8c6bb8202b6fa307b414dece29 --- /dev/null +++ b/graph/incidents_graphml/c/c8d9b610-285f-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.250 + 100.64.38.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718157732 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8d9b610-285f-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/c/c8db7140-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c8db7140-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5b247ac9948b4857169cc1df348f7cda7ad6449 --- /dev/null +++ b/graph/incidents_graphml/c/c8db7140-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.32 + 100.64.14.32 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363946 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8db7140-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c8de8430-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8de8430-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..501a8fdd37fe1e62f59e8df23bd2bc8fb7f1235b --- /dev/null +++ b/graph/incidents_graphml/c/c8de8430-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.218 + 100.64.90.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661712413 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8de8430-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c8e38f80-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/c/c8e38f80-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab518391b9df7ed042db82b22286cbccf40eb4fe --- /dev/null +++ b/graph/incidents_graphml/c/c8e38f80-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.36 + 100.64.53.36 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8e38f80-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/c/c8e9bba0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/c8e9bba0-285f-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52bf56f12d23f5366b9e41b219a67aa8ce88a621 --- /dev/null +++ b/graph/incidents_graphml/c/c8e9bba0-285f-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.250 + 100.64.38.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718157733 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8e9bba0-285f-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/c/c8eae040-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8eae040-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95ee8668e58a89c3df912677f2b01e92102208ba --- /dev/null +++ b/graph/incidents_graphml/c/c8eae040-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.219 + 100.64.90.219 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661712413 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8eae040-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c8ecf1a0-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c8ecf1a0-0725-11ee-9ff8-05edc9624e6c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31fc2aa64a456f7809c6a7e8dd618e483964fdfa --- /dev/null +++ b/graph/incidents_graphml/c/c8ecf1a0-0725-11ee-9ff8-05edc9624e6c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.207 + 100.64.72.207 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.216 + HOST-13084 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686356936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8ecf1a0-0725-11ee-9ff8-05edc9624e6c + + + diff --git a/graph/incidents_graphml/c/c8eef760-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/c8eef760-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6abf5d8f3d4ae3c42b6255222c07e529d5e41c83 --- /dev/null +++ b/graph/incidents_graphml/c/c8eef760-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.139 + 100.64.60.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685320131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8eef760-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/c8ef4f50-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/c/c8ef4f50-65c6-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bb9d0f599dddb4b6dc817673fc8a27757bf2a7f --- /dev/null +++ b/graph/incidents_graphml/c/c8ef4f50-65c6-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.154 + 100.64.81.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.158 + 100.64.72.158 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668613996 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ef4f50-65c6-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668613996 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c8ef4f50-65c6-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/c/c8f0aca0-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8f0aca0-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f81f43c7e58fcb4a2c0ab5797b17f586b041f729 --- /dev/null +++ b/graph/incidents_graphml/c/c8f0aca0-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.219 + 100.64.90.219 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661712413 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8f0aca0-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c8f1a600-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c8f1a600-5789-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d2ec31b06a3bdae3dcdc334194764d0c38576d0 --- /dev/null +++ b/graph/incidents_graphml/c/c8f1a600-5789-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.174 + 100.64.49.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695195978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c8f1a600-5789-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/c/c8f346f0-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/c/c8f346f0-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdb8e96d8baba24f6d2743dc85c15c16ced9edd3 --- /dev/null +++ b/graph/incidents_graphml/c/c8f346f0-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.36 + 100.64.53.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672914 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8f346f0-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/c/c8f51970-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8f51970-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82304a1a44fbe7465a4bb2531584c146c0558ce5 --- /dev/null +++ b/graph/incidents_graphml/c/c8f51970-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.195 + 100.64.82.195 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661712413 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c8f51970-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c8f71b00-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c8f71b00-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52380e1bac758e8b3d232a8e9d57de6d062e9f31 --- /dev/null +++ b/graph/incidents_graphml/c/c8f71b00-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692353999 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8f71b00-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/c8fc4560-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8fc4560-2701-11ed-bc1f-0928ad8774f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1683053a39c0f4d0f9fd975834711847be5131e5 --- /dev/null +++ b/graph/incidents_graphml/c/c8fc4560-2701-11ed-bc1f-0928ad8774f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.82.195 + 100.64.82.195 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661712413 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c8fc4560-2701-11ed-bc1f-0928ad8774f3 + + + diff --git a/graph/incidents_graphml/c/c900c130-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c900c130-5789-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbef7f1937608ee16c05872fdd6a829d02552679 --- /dev/null +++ b/graph/incidents_graphml/c/c900c130-5789-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.174 + 100.64.49.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695195979 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c900c130-5789-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/c/c902a670-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/c902a670-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9908bc0406405198f5a70d89cb6d030e3616056b --- /dev/null +++ b/graph/incidents_graphml/c/c902a670-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.60.139 + 100.64.60.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685320131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c902a670-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/c9035fd0-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c9035fd0-0725-11ee-9ff8-05edc9624e6c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7996ef307b1efebce4c7e5304df799dd2c9e18ec --- /dev/null +++ b/graph/incidents_graphml/c/c9035fd0-0725-11ee-9ff8-05edc9624e6c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.216 + HOST-13084 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.207 + 100.64.72.207 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686356936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9035fd0-0725-11ee-9ff8-05edc9624e6c + + + diff --git a/graph/incidents_graphml/c/c903f790-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c903f790-4ceb-11ee-b223-133fe64c82b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7d74be1c14ae967e1633ba414cc743a040fb76d --- /dev/null +++ b/graph/incidents_graphml/c/c903f790-4ceb-11ee-b223-133fe64c82b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.81 + 100.64.28.81 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694028606 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c903f790-4ceb-11ee-b223-133fe64c82b5 + + + diff --git a/graph/incidents_graphml/c/c90b3f40-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c90b3f40-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d468995567ae485f2cd99b6fbf4b19f8738b8dd --- /dev/null +++ b/graph/incidents_graphml/c/c90b3f40-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692353999 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c90b3f40-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/c914a600-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c914a600-3d6c-11ee-b209-c721199fad49.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7fee89495a8354b10c96d8debadc8a603235ceb --- /dev/null +++ b/graph/incidents_graphml/c/c914a600-3d6c-11ee-b209-c721199fad49.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.195 + 100.64.12.195 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692324793 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c914a600-3d6c-11ee-b209-c721199fad49 + + + diff --git a/graph/incidents_graphml/c/c91cecc0-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c91cecc0-a113-11ed-b936-1349c6e38dc6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5a0bcbf2c850f50f8c7b5567fc456c7fed10019 --- /dev/null +++ b/graph/incidents_graphml/c/c91cecc0-a113-11ed-b936-1349c6e38dc6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.130 + 100.64.9.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675134186 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c91cecc0-a113-11ed-b936-1349c6e38dc6 + + + diff --git a/graph/incidents_graphml/c/c9230740-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c9230740-a113-11ed-b936-1349c6e38dc6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14c4477d042f8fcf9cfca273be541d9a659a7a7d --- /dev/null +++ b/graph/incidents_graphml/c/c9230740-a113-11ed-b936-1349c6e38dc6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.9.130 + 100.64.9.130 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675134186 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9230740-a113-11ed-b936-1349c6e38dc6 + + + diff --git a/graph/incidents_graphml/c/c925c0d0-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c925c0d0-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33d914fc91f6409a60dcece0a975f77a74781bb7 --- /dev/null +++ b/graph/incidents_graphml/c/c925c0d0-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.8 + 100.64.30.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826875 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c925c0d0-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c925f3c0-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c925f3c0-73d5-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9562125d8924d0c0eb46c3f76694da5b20d5d17 --- /dev/null +++ b/graph/incidents_graphml/c/c925f3c0-73d5-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.22 + 100.64.67.22 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698307253 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c925f3c0-73d5-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/c/c926dd90-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c926dd90-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff601f0d47f5102783092011c4b394796368a4e2 --- /dev/null +++ b/graph/incidents_graphml/c/c926dd90-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.97 + 100.64.10.97 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692353999 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c926dd90-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/c92725f0-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c92725f0-a113-11ed-b936-1349c6e38dc6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0fc47600c9224aa4dcff74b82786c86dcb866a4 --- /dev/null +++ b/graph/incidents_graphml/c/c92725f0-a113-11ed-b936-1349c6e38dc6.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.143 + 100.64.86.143 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675134186 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c92725f0-a113-11ed-b936-1349c6e38dc6 + + + INCIDENT_LINK + 1675134186 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c92725f0-a113-11ed-b936-1349c6e38dc6 + + + diff --git a/graph/incidents_graphml/c/c9289a40-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c9289a40-276b-11ef-b363-fdc4064c84e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5a86ad23e712cf7d640fc9ed3e7ccca845cac79 --- /dev/null +++ b/graph/incidents_graphml/c/c9289a40-276b-11ef-b363-fdc4064c84e0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.80 + 100.64.92.80 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718052936 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9289a40-276b-11ef-b363-fdc4064c84e0 + + + diff --git a/graph/incidents_graphml/c/c93d63b0-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c93d63b0-3d6c-11ee-b209-c721199fad49.graphml new file mode 100644 index 0000000000000000000000000000000000000000..288ec03bbf895578c718b1aced079502164ec0c8 --- /dev/null +++ b/graph/incidents_graphml/c/c93d63b0-3d6c-11ee-b209-c721199fad49.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.197 + 100.64.12.197 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692324793 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c93d63b0-3d6c-11ee-b209-c721199fad49 + + + diff --git a/graph/incidents_graphml/c/c93ed260-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c93ed260-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f245f4ad544bb2407eb5da077048c018359a774 --- /dev/null +++ b/graph/incidents_graphml/c/c93ed260-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.97 + 100.64.10.97 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692353999 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c93ed260-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/c9405e50-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/c9405e50-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10972ae4b0e286a83c272d8f7630a817cf85054a --- /dev/null +++ b/graph/incidents_graphml/c/c9405e50-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.43 + 100.64.36.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695936002 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9405e50-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/c94e9190-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/c94e9190-33da-11ed-bcaf-e3fcd610a254.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f54dcbbad7f20685f068dc3c0d07e4fcba81a303 --- /dev/null +++ b/graph/incidents_graphml/c/c94e9190-33da-11ed-bcaf-e3fcd610a254.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.93 + 100.64.82.93 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.181 + 100.64.71.181 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.116 + 100.64.71.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663125029 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c94e9190-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125029 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c94e9190-33da-11ed-bcaf-e3fcd610a254 + + + diff --git a/graph/incidents_graphml/c/c95d2fd0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c95d2fd0-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8cfb272ec07561130beb14ed89959f2e92df14ed --- /dev/null +++ b/graph/incidents_graphml/c/c95d2fd0-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.232 + 100.64.9.232 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692353999 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c95d2fd0-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/c95f91b0-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c95f91b0-3d6c-11ee-b209-c721199fad49.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f3af3be157a2550f6dfb16e3c91e951e0a3a8a5 --- /dev/null +++ b/graph/incidents_graphml/c/c95f91b0-3d6c-11ee-b209-c721199fad49.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.197 + 100.64.12.197 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692324794 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c95f91b0-3d6c-11ee-b209-c721199fad49 + + + diff --git a/graph/incidents_graphml/c/c964b690-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/c/c964b690-017b-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa7f5a0750062bb148118541ef6d2b7f3b9285ad --- /dev/null +++ b/graph/incidents_graphml/c/c964b690-017b-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.79.214 + 100.64.79.214 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685734166 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c964b690-017b-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/c/c96590e0-082a-11ef-9432-0316676438e6.graphml b/graph/incidents_graphml/c/c96590e0-082a-11ef-9432-0316676438e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0137c891c8c026c432602d4f1536e4ce1f2dc839 --- /dev/null +++ b/graph/incidents_graphml/c/c96590e0-082a-11ef-9432-0316676438e6.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.180 + 100.64.34.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.64.56 + 100.64.64.56 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.164 + 100.64.97.164 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.172 + 100.64.19.172 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.67.11 + 100.64.67.11 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.26.109 + 100.64.26.109 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.129 + USER-0015-2172.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.45.28 + 100.64.45.28 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.83 + 100.64.10.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.103 + 100.64.23.103 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.10.210 + 100.64.10.210 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.165 + 100.64.97.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.47.89 + USER-0015-2173.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.83 + 100.64.17.83 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.166 + 100.64.97.166 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616533 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c96590e0-082a-11ef-9432-0316676438e6 + + + diff --git a/graph/incidents_graphml/c/c97ffa20-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/c97ffa20-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..018b4c1149cc8b8e16d90d43bdd93505a3b219db --- /dev/null +++ b/graph/incidents_graphml/c/c97ffa20-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.101 + 100.64.32.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c97ffa20-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/c981f5e0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c981f5e0-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aed2cc626b1f758687d377ffdbf56df45d955685 --- /dev/null +++ b/graph/incidents_graphml/c/c981f5e0-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.232 + 100.64.9.232 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692354000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c981f5e0-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/c987e580-2cea-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/c/c987e580-2cea-11ee-b828-99998b56933c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..732188c815f43232440adf70b9d5b61f802d3741 --- /dev/null +++ b/graph/incidents_graphml/c/c987e580-2cea-11ee-b828-99998b56933c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.20.73 + 100.64.20.73 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690509741 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c987e580-2cea-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690509741 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c987e580-2cea-11ee-b828-99998b56933c + + + diff --git a/graph/incidents_graphml/c/c98e2af0-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/c98e2af0-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2961d396cec9cd40e707c530246505042b87737d --- /dev/null +++ b/graph/incidents_graphml/c/c98e2af0-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.101 + 100.64.32.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370092 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c98e2af0-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/c9957060-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/c/c9957060-138b-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed16b3e8abfc040649c6350e65dcc4d0fcba364a --- /dev/null +++ b/graph/incidents_graphml/c/c9957060-138b-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.150 + 100.64.9.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.81 + 100.64.74.81 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687720160 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9957060-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720160 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9957060-138b-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/c/c9982940-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/c9982940-8c0d-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1fc7b24f32185b3ab5f0dc02137ab6d42a651854 --- /dev/null +++ b/graph/incidents_graphml/c/c9982940-8c0d-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.216 + 100.64.16.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700970134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9982940-8c0d-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/c/c99b1600-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/c99b1600-170a-11ee-9198-135231c2dce9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86c7d8e26fb626bca1ed4725ebce4c7ca5f079a5 --- /dev/null +++ b/graph/incidents_graphml/c/c99b1600-170a-11ee-9198-135231c2dce9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.161 + 100.64.33.161 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688104559 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c99b1600-170a-11ee-9198-135231c2dce9 + + + diff --git a/graph/incidents_graphml/c/c9a502d0-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c9a502d0-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..032398e21fa32a993245998ee22a7271792fe509 --- /dev/null +++ b/graph/incidents_graphml/c/c9a502d0-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.34 + 100.64.14.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363947 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9a502d0-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c9a56d40-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/c9a56d40-0da9-11ee-812a-a702327978d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88f3517c9f150b7e1c4f764a51a242fb86c03db7 --- /dev/null +++ b/graph/incidents_graphml/c/c9a56d40-0da9-11ee-812a-a702327978d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.144 + 100.64.25.144 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687073338 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9a56d40-0da9-11ee-812a-a702327978d7 + + + diff --git a/graph/incidents_graphml/c/c9a71820-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c9a71820-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78ab8e4c1b7ef648b8e0dffd734cf265c23e30dd --- /dev/null +++ b/graph/incidents_graphml/c/c9a71820-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.30 + 100.64.6.30 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.58 + 100.64.1.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.50.74 + USER-0015-1771.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660528292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9a71820-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9a71820-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9a71820-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9a71820-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/c/c9aa4c10-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/c/c9aa4c10-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a776d2d3e7ae1e53c28320d74ef2bff82041a82 --- /dev/null +++ b/graph/incidents_graphml/c/c9aa4c10-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.70 + 100.64.94.70 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.37.167 + 100.64.37.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.71 + 100.64.94.71 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.6 + 100.64.40.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.72 + 100.64.94.72 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198425 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9aa4c10-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/c/c9ac1ae0-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/c9ac1ae0-33da-11ed-bcaf-e3fcd610a254.graphml new file mode 100644 index 0000000000000000000000000000000000000000..605025445dee984c6f7620c86eaefa4d12c0f609 --- /dev/null +++ b/graph/incidents_graphml/c/c9ac1ae0-33da-11ed-bcaf-e3fcd610a254.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.94 + 100.64.82.94 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1663125029 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c9ac1ae0-33da-11ed-bcaf-e3fcd610a254 + + + diff --git a/graph/incidents_graphml/c/c9b15cd0-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/c/c9b15cd0-138b-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..363bf89d7906f8c93e9d4c96a80454e1f8230f3f --- /dev/null +++ b/graph/incidents_graphml/c/c9b15cd0-138b-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.82 + 100.64.74.82 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.166 + 100.64.1.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.83 + 100.64.10.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687720160 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9b15cd0-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720160 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9b15cd0-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720160 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9b15cd0-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720160 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9b15cd0-138b-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/c/c9b640e0-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c9b640e0-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4703e7fed0cff6cc3b47bb8e754e50cfa8a2c08f --- /dev/null +++ b/graph/incidents_graphml/c/c9b640e0-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.34 + 100.64.14.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363948 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9b640e0-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c9c0b1e0-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/c9c0b1e0-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd08bc2dd0c04afe072136ea1b3902d16ec73477 --- /dev/null +++ b/graph/incidents_graphml/c/c9c0b1e0-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.79 + 100.64.27.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695936003 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9c0b1e0-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/c9c17b70-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c9c17b70-a166-11ed-863f-a161c6cf34a1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d092c65814d229c9b3b8423e7ec37800b405ae5a --- /dev/null +++ b/graph/incidents_graphml/c/c9c17b70-a166-11ed-863f-a161c6cf34a1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.217 + 100.64.86.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675169836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9c17b70-a166-11ed-863f-a161c6cf34a1 + + + diff --git a/graph/incidents_graphml/c/c9c2cf70-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c9c2cf70-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8b7f55dcafc9c80379a8eb37b3337c9ffdf5b53 --- /dev/null +++ b/graph/incidents_graphml/c/c9c2cf70-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.99 + 100.64.10.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692354000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9c2cf70-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/c9c4fde0-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c9c4fde0-a166-11ed-863f-a161c6cf34a1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9c3eebcf04591e0ee8e8f22cb859722dfd55ed1 --- /dev/null +++ b/graph/incidents_graphml/c/c9c4fde0-a166-11ed-863f-a161c6cf34a1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.86.217 + 100.64.86.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1675169836 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9c4fde0-a166-11ed-863f-a161c6cf34a1 + + + diff --git a/graph/incidents_graphml/c/c9c50330-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/c9c50330-0da9-11ee-812a-a702327978d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd3071a3b38521d96753bb82b23f7ff33f71284e --- /dev/null +++ b/graph/incidents_graphml/c/c9c50330-0da9-11ee-812a-a702327978d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.144 + 100.64.25.144 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687073338 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9c50330-0da9-11ee-812a-a702327978d7 + + + diff --git a/graph/incidents_graphml/c/c9c66ba0-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/c9c66ba0-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..124f96fdb7d571ca26ddf08c656b3f59efcc781d --- /dev/null +++ b/graph/incidents_graphml/c/c9c66ba0-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.25 + 100.64.17.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685320132 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9c66ba0-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/c9c720c0-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c9c720c0-a166-11ed-863f-a161c6cf34a1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1cbb4429a78a4ac62130bf3d89e8704084a9844 --- /dev/null +++ b/graph/incidents_graphml/c/c9c720c0-a166-11ed-863f-a161c6cf34a1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.219 + 100.64.86.219 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1675169836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9c720c0-a166-11ed-863f-a161c6cf34a1 + + + diff --git a/graph/incidents_graphml/c/c9ca7c20-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c9ca7c20-a166-11ed-863f-a161c6cf34a1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5034a0b9523087541df8002af7be1552fdb7ea1 --- /dev/null +++ b/graph/incidents_graphml/c/c9ca7c20-a166-11ed-863f-a161c6cf34a1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.219 + 100.64.86.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675169836 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9ca7c20-a166-11ed-863f-a161c6cf34a1 + + + diff --git a/graph/incidents_graphml/c/c9ccfb70-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/c9ccfb70-170a-11ee-9198-135231c2dce9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28903906cf090be09c6c2961bbea6e9609b6d538 --- /dev/null +++ b/graph/incidents_graphml/c/c9ccfb70-170a-11ee-9198-135231c2dce9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.43 + 100.64.11.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688104559 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ccfb70-170a-11ee-9198-135231c2dce9 + + + diff --git a/graph/incidents_graphml/c/c9cd5410-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/c9cd5410-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..159a36c093ade06563092c2993418480480a37f2 --- /dev/null +++ b/graph/incidents_graphml/c/c9cd5410-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.186 + 100.64.40.186 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852847 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9cd5410-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/c9cebe20-0995-11ed-84f1-6d22bc1fbcb2.graphml b/graph/incidents_graphml/c/c9cebe20-0995-11ed-84f1-6d22bc1fbcb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..098ccca0fdda7bfd71f3ae57980d32a8191c5b45 --- /dev/null +++ b/graph/incidents_graphml/c/c9cebe20-0995-11ed-84f1-6d22bc1fbcb2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.42 + 100.64.71.42 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658477445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9cebe20-0995-11ed-84f1-6d22bc1fbcb2 + + + diff --git a/graph/incidents_graphml/c/c9cff420-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/c9cff420-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e8fe5fa38357d7f6288ab59086f5fd06877aed1 --- /dev/null +++ b/graph/incidents_graphml/c/c9cff420-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.79 + 100.64.27.79 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695936003 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9cff420-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/c9d4e490-3fe4-11ee-9108-95499536c7df.graphml b/graph/incidents_graphml/c/c9d4e490-3fe4-11ee-9108-95499536c7df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6356c377dd963fa4fa8a46f1b4f291a2b455801 --- /dev/null +++ b/graph/incidents_graphml/c/c9d4e490-3fe4-11ee-9108-95499536c7df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.2 + 100.64.18.2 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692596236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9d4e490-3fe4-11ee-9108-95499536c7df + + + diff --git a/graph/incidents_graphml/c/c9d81d10-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c9d81d10-3d6c-11ee-b209-c721199fad49.graphml new file mode 100644 index 0000000000000000000000000000000000000000..903d1c8cff61295fd2bdd42fe39e8cd0921af72a --- /dev/null +++ b/graph/incidents_graphml/c/c9d81d10-3d6c-11ee-b209-c721199fad49.graphml @@ -0,0 +1,323 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.99 + 100.64.10.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.199 + 100.64.12.199 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.200 + 100.64.12.200 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.163 + 100.64.9.163 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.201 + 100.64.12.201 + ["Exploiting Host"] + 0.83125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.202 + 100.64.12.202 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.203 + 100.64.12.203 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + INCIDENT_LINK + 1692324794 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9d81d10-3d6c-11ee-b209-c721199fad49 + + + diff --git a/graph/incidents_graphml/c/c9dc71f0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c9dc71f0-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86beebff004c387ff23bdeab956d10ae149c6df5 --- /dev/null +++ b/graph/incidents_graphml/c/c9dc71f0-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.99 + 100.64.10.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692354000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9dc71f0-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/c9ddd050-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/c/c9ddd050-056f-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aef0fee25369c1f3734955ed9f4c885a11ffa805 --- /dev/null +++ b/graph/incidents_graphml/c/c9ddd050-056f-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1686168818 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9ddd050-056f-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686168818 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9ddd050-056f-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/c/c9e1e2e0-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/c9e1e2e0-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae9cd675dbd1322598956e1ecb5c8f24648c3cad --- /dev/null +++ b/graph/incidents_graphml/c/c9e1e2e0-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.17.25 + 100.64.17.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685320132 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9e1e2e0-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/c9e7c5d0-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c9e7c5d0-5789-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fc77d88401a523df1b269450b405e933d80eee2 --- /dev/null +++ b/graph/incidents_graphml/c/c9e7c5d0-5789-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.115 + 100.64.19.115 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695195980 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9e7c5d0-5789-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/c/c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/c/c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1de4b144957493dd89d4ece5927455fafea53f4 --- /dev/null +++ b/graph/incidents_graphml/c/c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b.graphml @@ -0,0 +1,531 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.120 + 100.64.17.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.121 + 100.64.17.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.122 + USER-0015-1214.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.123 + 100.64.17.123 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.124 + 100.64.17.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.125 + 100.64.17.125 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.17.126 + 100.64.17.126 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.127 + 100.64.17.127 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.128 + 100.64.17.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.129 + 100.64.17.129 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.157 + 100.64.9.157 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.130 + 100.64.17.130 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030271 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b + + + diff --git a/graph/incidents_graphml/c/c9efb060-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/c/c9efb060-6503-11ee-b447-a9f06618d419.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e9999a4fc6c6e8abe40ca2b306e3b616cf5d25b --- /dev/null +++ b/graph/incidents_graphml/c/c9efb060-6503-11ee-b447-a9f06618d419.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.148.220 + 192.168.148.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.1 + USER-0015-2034.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.1 + 100.64.90.1 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696677744 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9efb060-6503-11ee-b447-a9f06618d419 + + + INCIDENT_LINK + 1696677744 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9efb060-6503-11ee-b447-a9f06618d419 + + + INCIDENT_LINK + 1696677744 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9efb060-6503-11ee-b447-a9f06618d419 + + + INCIDENT_LINK + 1696677744 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9efb060-6503-11ee-b447-a9f06618d419 + + + diff --git a/graph/incidents_graphml/c/c9f4e0e0-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/c9f4e0e0-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4c1339c6e1890c75eeec4bcc1e6c56748f63d8e --- /dev/null +++ b/graph/incidents_graphml/c/c9f4e0e0-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.184 + 100.64.17.184 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.12 + 100.64.77.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370466 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9f4e0e0-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370466 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9f4e0e0-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/c/c9f53560-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c9f53560-4ceb-11ee-b223-133fe64c82b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0ff87ef17e61541494b940a9de9f2234ad39c16 --- /dev/null +++ b/graph/incidents_graphml/c/c9f53560-4ceb-11ee-b223-133fe64c82b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694028608 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c9f53560-4ceb-11ee-b223-133fe64c82b5 + + + diff --git a/graph/incidents_graphml/c/c9f8c660-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/c9f8c660-170a-11ee-9198-135231c2dce9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..788903aca9e78574e3d842640840d93d97d02da1 --- /dev/null +++ b/graph/incidents_graphml/c/c9f8c660-170a-11ee-9198-135231c2dce9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.43 + 100.64.11.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688104560 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c9f8c660-170a-11ee-9198-135231c2dce9 + + + diff --git a/graph/incidents_graphml/c/c9f92af0-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c9f92af0-5789-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0360eab5f46b896346725e641acbdb1293f3673e --- /dev/null +++ b/graph/incidents_graphml/c/c9f92af0-5789-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.115 + 100.64.19.115 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695195980 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c9f92af0-5789-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/c/c9fe2ac0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c9fe2ac0-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06fb97d5198a31e6521512970fe10e3ac1ce072f --- /dev/null +++ b/graph/incidents_graphml/c/c9fe2ac0-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692354000 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c9fe2ac0-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/ca00ca20-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/ca00ca20-2607-11ee-ad88-fb76ca0617eb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef2b4994c76b248ee1c57e0885766be1e161db5a --- /dev/null +++ b/graph/incidents_graphml/c/ca00ca20-2607-11ee-ad88-fb76ca0617eb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.31 + 100.64.15.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689752539 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca00ca20-2607-11ee-ad88-fb76ca0617eb + + + diff --git a/graph/incidents_graphml/c/ca00f1b0-0995-11ed-84f1-6d22bc1fbcb2.graphml b/graph/incidents_graphml/c/ca00f1b0-0995-11ed-84f1-6d22bc1fbcb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8bdab02a98a3c55015e495e7d77a730282fb85d --- /dev/null +++ b/graph/incidents_graphml/c/ca00f1b0-0995-11ed-84f1-6d22bc1fbcb2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.50 + 100.64.71.50 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658477446 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca00f1b0-0995-11ed-84f1-6d22bc1fbcb2 + + + diff --git a/graph/incidents_graphml/c/ca04c5c0-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/ca04c5c0-4ceb-11ee-b223-133fe64c82b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39f1273bce04db9d9459f2f63b82a08d65364448 --- /dev/null +++ b/graph/incidents_graphml/c/ca04c5c0-4ceb-11ee-b223-133fe64c82b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694028608 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca04c5c0-4ceb-11ee-b223-133fe64c82b5 + + + diff --git a/graph/incidents_graphml/c/ca067160-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/ca067160-5789-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..994f8be25bd91516070870bc85b83ce983b1b50b --- /dev/null +++ b/graph/incidents_graphml/c/ca067160-5789-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.224 + 100.64.32.224 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695195980 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca067160-5789-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/c/ca086bb0-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/ca086bb0-33da-11ed-bcaf-e3fcd610a254.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0cd2887c167ecc320fe35623b82ffa3f208d536 --- /dev/null +++ b/graph/incidents_graphml/c/ca086bb0-33da-11ed-bcaf-e3fcd610a254.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.95 + 100.64.82.95 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.255 + 100.64.73.255 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.96 + 100.64.82.96 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.220 + 100.64.79.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663125030 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca086bb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125030 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca086bb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125030 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca086bb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125030 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca086bb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125030 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca086bb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125030 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca086bb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125030 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca086bb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125030 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca086bb0-33da-11ed-bcaf-e3fcd610a254 + + + diff --git a/graph/incidents_graphml/c/ca145410-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/ca145410-5789-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01b66b3ad61edb361a85f4a7b0df5c93f5355a2d --- /dev/null +++ b/graph/incidents_graphml/c/ca145410-5789-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.224 + 100.64.32.224 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695195980 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca145410-5789-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/c/ca153a20-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/ca153a20-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d3e9ee510562d51cd81510426be5701a77da195 --- /dev/null +++ b/graph/incidents_graphml/c/ca153a20-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.33 + 100.64.75.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.49 + USER-0015-1822.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370467 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca153a20-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370467 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca153a20-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/c/ca1ed770-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/ca1ed770-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6bb5d4bff1d24f594dfc9615ff926d88d940c6e --- /dev/null +++ b/graph/incidents_graphml/c/ca1ed770-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.183 + 100.64.6.183 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695936003 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca1ed770-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/ca217180-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/ca217180-2607-11ee-ad88-fb76ca0617eb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..194628056adcd597e4566965513f743ad561ee1d --- /dev/null +++ b/graph/incidents_graphml/c/ca217180-2607-11ee-ad88-fb76ca0617eb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.31 + 100.64.15.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689752539 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca217180-2607-11ee-ad88-fb76ca0617eb + + + diff --git a/graph/incidents_graphml/c/ca240b80-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/ca240b80-5789-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf8435e3f6ad114004bf0bee9f72398b34cf5655 --- /dev/null +++ b/graph/incidents_graphml/c/ca240b80-5789-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.185 + 100.64.12.185 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695195980 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca240b80-5789-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/c/ca2d2a10-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/ca2d2a10-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bccf849de0e64b68b83cce13b4c31d55bbbdc860 --- /dev/null +++ b/graph/incidents_graphml/c/ca2d2a10-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.185 + 100.64.18.185 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca2d2a10-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/ca2d5f30-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/ca2d5f30-285f-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0ab5a2dd8b20719f2a16572f86f98a91ce22dc2 --- /dev/null +++ b/graph/incidents_graphml/c/ca2d5f30-285f-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718157735 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca2d5f30-285f-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/c/ca2e67d0-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/ca2e67d0-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcb1172b30ccb70be3b8e171a9fa6c88a76daa4e --- /dev/null +++ b/graph/incidents_graphml/c/ca2e67d0-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.183 + 100.64.6.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695936003 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ca2e67d0-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/ca3326b0-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/ca3326b0-5789-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c7be9a855e6757dd04340c83c8158c510ea2606 --- /dev/null +++ b/graph/incidents_graphml/c/ca3326b0-5789-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.54 + 100.64.57.54 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695195981 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca3326b0-5789-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/c/ca3ae5b0-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/ca3ae5b0-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddf393d2dcd31e70e755044e5ccf353febc268da --- /dev/null +++ b/graph/incidents_graphml/c/ca3ae5b0-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.185 + 100.64.18.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370093 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ca3ae5b0-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/ca3b41e0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/ca3b41e0-285f-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c016632ce6a089042d003372b3943375e790679f --- /dev/null +++ b/graph/incidents_graphml/c/ca3b41e0-285f-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718157735 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ca3b41e0-285f-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/c/ca403cd0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/ca403cd0-3db0-11ee-8145-f76e3165b5cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ebe52183ad1b25de94f0f1f4f3087e0e99372ca --- /dev/null +++ b/graph/incidents_graphml/c/ca403cd0-3db0-11ee-8145-f76e3165b5cc.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.103 + 100.64.10.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692354001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca403cd0-3db0-11ee-8145-f76e3165b5cc + + + INCIDENT_LINK + 1692354001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca403cd0-3db0-11ee-8145-f76e3165b5cc + + + diff --git a/graph/incidents_graphml/c/ca450c00-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca450c00-71eb-11ee-807d-75267aac45c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a130f692937530f44a66f4a14c9fb7d7599d730c --- /dev/null +++ b/graph/incidents_graphml/c/ca450c00-71eb-11ee-807d-75267aac45c9.graphml @@ -0,0 +1,209 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.75 + 100.64.8.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.68 + 100.64.43.68 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.69 + 100.64.43.69 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.70 + 100.64.43.70 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca450c00-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca450c00-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca450c00-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca450c00-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca450c00-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca450c00-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca450c00-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca450c00-71eb-11ee-807d-75267aac45c9 + + + diff --git a/graph/incidents_graphml/c/ca51d050-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/ca51d050-2607-11ee-ad88-fb76ca0617eb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d97f71838ded89291e637308b87fe2107bb9ad3 --- /dev/null +++ b/graph/incidents_graphml/c/ca51d050-2607-11ee-ad88-fb76ca0617eb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.102 + 100.64.15.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689752539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ca51d050-2607-11ee-ad88-fb76ca0617eb + + + diff --git a/graph/incidents_graphml/c/ca5586c0-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca5586c0-71eb-11ee-807d-75267aac45c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de48ce31ebfc6ff3ef9f77e9bdc705997923a8ad --- /dev/null +++ b/graph/incidents_graphml/c/ca5586c0-71eb-11ee-807d-75267aac45c9.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca5586c0-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca5586c0-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca5586c0-71eb-11ee-807d-75267aac45c9 + + + diff --git a/graph/incidents_graphml/c/ca62f440-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca62f440-71eb-11ee-807d-75267aac45c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..635231229de3e58605d30e6d5723111ff891bb26 --- /dev/null +++ b/graph/incidents_graphml/c/ca62f440-71eb-11ee-807d-75267aac45c9.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca62f440-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ca62f440-71eb-11ee-807d-75267aac45c9 + + + diff --git a/graph/incidents_graphml/c/ca65e7a0-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/c/ca65e7a0-efc3-11ec-9799-0176ac54cf1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55b2d22d58a2bf51fbbc6e61694f203bf3539135 --- /dev/null +++ b/graph/incidents_graphml/c/ca65e7a0-efc3-11ec-9799-0176ac54cf1b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.161 + 100.64.80.161 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.90 + USER-0015-1841.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655638473 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca65e7a0-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638473 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca65e7a0-efc3-11ec-9799-0176ac54cf1b + + + diff --git a/graph/incidents_graphml/c/ca6773f0-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/ca6773f0-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c7580bb5de949df37f9f63ca45f60e04b21b377 --- /dev/null +++ b/graph/incidents_graphml/c/ca6773f0-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.192 + 100.64.38.192 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169546 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca6773f0-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/ca7ddd90-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/ca7ddd90-ee30-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bc7dbd004e99d56a8c6eb9dd5a46597c29ef505 --- /dev/null +++ b/graph/incidents_graphml/c/ca7ddd90-ee30-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.214.204 + USER-0015-1832.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 10.148.128.32 + 10.148.128.32 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca7ddd90-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca7ddd90-ee30-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/c/ca7e4470-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca7e4470-71eb-11ee-807d-75267aac45c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a8be62ad4bde0b61ea12ac3f45961635c89816e --- /dev/null +++ b/graph/incidents_graphml/c/ca7e4470-71eb-11ee-807d-75267aac45c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.192 + 100.64.40.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca7e4470-71eb-11ee-807d-75267aac45c9 + + + diff --git a/graph/incidents_graphml/c/ca81b5b0-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/ca81b5b0-182c-11ee-b591-f5bec484f8bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63de9b505a9eb6b49a096a0ca409f3b9a8d2e995 --- /dev/null +++ b/graph/incidents_graphml/c/ca81b5b0-182c-11ee-b591-f5bec484f8bc.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.1 + 100.64.34.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.128 + 100.64.71.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.86 + 100.64.73.86 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.4.163 + 100.64.4.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.87 + 100.64.73.87 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688229115 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca81b5b0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229115 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca81b5b0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229115 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca81b5b0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229115 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca81b5b0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229115 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca81b5b0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229115 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca81b5b0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229115 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca81b5b0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229115 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca81b5b0-182c-11ee-b591-f5bec484f8bc + + + diff --git a/graph/incidents_graphml/c/ca82d8a0-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/c/ca82d8a0-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46e7eed45e9abce135e5431034bbf7e2bcdb92b5 --- /dev/null +++ b/graph/incidents_graphml/c/ca82d8a0-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721029780 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca82d8a0-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/c/ca876da0-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/ca876da0-3245-11ef-9bb6-5bd0425d571b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5f8ce39b00a7755ced589cfc48f7405df4e02ac --- /dev/null +++ b/graph/incidents_graphml/c/ca876da0-3245-11ef-9bb6-5bd0425d571b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.123 + 100.64.8.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719246080 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ca876da0-3245-11ef-9bb6-5bd0425d571b + + + diff --git a/graph/incidents_graphml/c/ca8d1180-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca8d1180-71eb-11ee-807d-75267aac45c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7054d877b81b93109b4382337ab4904b38ca82be --- /dev/null +++ b/graph/incidents_graphml/c/ca8d1180-71eb-11ee-807d-75267aac45c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.192 + 100.64.40.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698096802 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca8d1180-71eb-11ee-807d-75267aac45c9 + + + diff --git a/graph/incidents_graphml/c/ca8d5a60-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ca8d5a60-3d0b-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19eb74e428ce7b58f39aa231c502f1b05472024d --- /dev/null +++ b/graph/incidents_graphml/c/ca8d5a60-3d0b-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283134 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ca8d5a60-3d0b-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/c/ca8faf10-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/ca8faf10-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..590f25441e56883f4901c2c68ad45df1c26d677e --- /dev/null +++ b/graph/incidents_graphml/c/ca8faf10-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.105 + 100.64.39.105 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685320133 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ca8faf10-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/ca9906b0-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/ca9906b0-ee30-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9fdd5b90496c86dff587d385070f6c859b045c88 --- /dev/null +++ b/graph/incidents_graphml/c/ca9906b0-ee30-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.86 + 100.64.71.86 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.172 + USER-0015-1789.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca9906b0-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ca9906b0-ee30-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/c/ca9d1760-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/c/ca9d1760-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7889d066ed182e9a5cf586f3a6e00ca339ef9007 --- /dev/null +++ b/graph/incidents_graphml/c/ca9d1760-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721029780 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ca9d1760-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/c/caa4ed90-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/caa4ed90-ee30-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04f3d25346b80c14d152b3fa37203b651c0d8309 --- /dev/null +++ b/graph/incidents_graphml/c/caa4ed90-ee30-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.107 + 100.64.78.107 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.28 + USER-0015-1833.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + caa4ed90-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + caa4ed90-ee30-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/c/caa86730-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/caa86730-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a01065e445d13339b2fcedac8412aa93fff04405 --- /dev/null +++ b/graph/incidents_graphml/c/caa86730-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.39.105 + 100.64.39.105 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685320134 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + caa86730-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/cab012f0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cab012f0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..22fe4bdcb0a39274ce4e57b898edae2c6a5397c6 --- /dev/null +++ b/graph/incidents_graphml/c/cab012f0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.134 + 100.64.34.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852848 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cab012f0-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/cabf17d0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/cabf17d0-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69c645b9fc40a1216836c0712eb9704d23165ffb --- /dev/null +++ b/graph/incidents_graphml/c/cabf17d0-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.56 + 100.64.76.56 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.32 + 100.64.75.32 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660528294 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cabf17d0-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528294 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cabf17d0-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/c/cabff8b0-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/c/cabff8b0-6503-11ee-b447-a9f06618d419.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a1f2a5c16ecc7201efdb97d6f3a36177fd88c55 --- /dev/null +++ b/graph/incidents_graphml/c/cabff8b0-6503-11ee-b447-a9f06618d419.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.9 + USER-0015-2035.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1696677745 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cabff8b0-6503-11ee-b447-a9f06618d419 + + + diff --git a/graph/incidents_graphml/c/cac26270-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cac26270-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60eb394f9e4ee99ebec16d901a9e8138a85ff4cc --- /dev/null +++ b/graph/incidents_graphml/c/cac26270-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.134 + 100.64.34.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852848 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cac26270-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/cac3b350-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/cac3b350-3245-11ef-9bb6-5bd0425d571b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..171d71b1443c0fa3e4e8183149a8988752d0a713 --- /dev/null +++ b/graph/incidents_graphml/c/cac3b350-3245-11ef-9bb6-5bd0425d571b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.200 + USER-0015-1992.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719246080 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cac3b350-3245-11ef-9bb6-5bd0425d571b + + + diff --git a/graph/incidents_graphml/c/cac3d8f0-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/cac3d8f0-71eb-11ee-807d-75267aac45c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e39da1d6250abf9187c41d4c7578b502ef1d7ae7 --- /dev/null +++ b/graph/incidents_graphml/c/cac3d8f0-71eb-11ee-807d-75267aac45c9.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.74 + 100.64.43.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cac3d8f0-71eb-11ee-807d-75267aac45c9 + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cac3d8f0-71eb-11ee-807d-75267aac45c9 + + + diff --git a/graph/incidents_graphml/c/cac75e10-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/c/cac75e10-1b49-11ee-80b5-4fc6a3f1abdb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee69fdc7f744819517deb65d43bcb86dd8ebd5b5 --- /dev/null +++ b/graph/incidents_graphml/c/cac75e10-1b49-11ee-80b5-4fc6a3f1abdb.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.197 + 100.64.13.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.198 + 100.64.13.198 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.199 + 100.64.13.199 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.200 + 100.64.13.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.201 + 100.64.13.201 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.202 + 100.64.13.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.203 + 100.64.13.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571424 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cac75e10-1b49-11ee-80b5-4fc6a3f1abdb + + + diff --git a/graph/incidents_graphml/c/cacbb940-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cacbb940-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13b42058d03060988119057af0acc247fd5d0156 --- /dev/null +++ b/graph/incidents_graphml/c/cacbb940-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.163 + 100.64.45.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695936004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cacbb940-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/cacfcff0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cacfcff0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8bc4599290dec055d2f43f98310f165def5e4f0 --- /dev/null +++ b/graph/incidents_graphml/c/cacfcff0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.41 + USER-0015-1211.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852848 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cacfcff0-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/cad209c0-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/cad209c0-71eb-11ee-807d-75267aac45c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7bd25b7fc39c26014708e6062010c1f2369531d1 --- /dev/null +++ b/graph/incidents_graphml/c/cad209c0-71eb-11ee-807d-75267aac45c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.74 + 100.64.43.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698096802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cad209c0-71eb-11ee-807d-75267aac45c9 + + + diff --git a/graph/incidents_graphml/c/cad518c0-2454-11ee-8059-d3725e6f3965.graphml b/graph/incidents_graphml/c/cad518c0-2454-11ee-8059-d3725e6f3965.graphml new file mode 100644 index 0000000000000000000000000000000000000000..279db17319894037828d230bf95e915d28c157d7 --- /dev/null +++ b/graph/incidents_graphml/c/cad518c0-2454-11ee-8059-d3725e6f3965.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.119 + 100.64.23.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689565709 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cad518c0-2454-11ee-8059-d3725e6f3965 + + + diff --git a/graph/incidents_graphml/c/cada8110-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cada8110-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb75e108a946f1c2302a97d64a8a73b3aa9039b0 --- /dev/null +++ b/graph/incidents_graphml/c/cada8110-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.252 + 100.64.40.252 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.253 + 100.64.40.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.96 + 100.64.25.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370094 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cada8110-6b4f-11ee-a565-4f025efe2b34 + + + INCIDENT_LINK + 1697370094 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cada8110-6b4f-11ee-a565-4f025efe2b34 + + + INCIDENT_LINK + 1697370094 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cada8110-6b4f-11ee-a565-4f025efe2b34 + + + INCIDENT_LINK + 1697370094 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cada8110-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/cadbbed0-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cadbbed0-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c63d900d32d9112227deecff7f86bb2104de5df --- /dev/null +++ b/graph/incidents_graphml/c/cadbbed0-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.45.163 + 100.64.45.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695936005 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cadbbed0-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/cade9d00-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cade9d00-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..526c23da1c0cb0818a8143e47a6e19b1bab6b637 --- /dev/null +++ b/graph/incidents_graphml/c/cade9d00-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.41 + USER-0015-1211.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852848 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cade9d00-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/cadf2830-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/cadf2830-8c0d-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a68f609e33fe1150b5890bc858f9e2f676a731e7 --- /dev/null +++ b/graph/incidents_graphml/c/cadf2830-8c0d-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.216 + 100.64.16.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700970136 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cadf2830-8c0d-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/c/cae056a0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cae056a0-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5eff02241f415c2c125ba9e0461aaac784d9633a --- /dev/null +++ b/graph/incidents_graphml/c/cae056a0-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.115 + 100.64.29.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659111 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cae056a0-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/caebbc60-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/caebbc60-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6b8d6a7477c1065d6ab850b398a71f27db590ce --- /dev/null +++ b/graph/incidents_graphml/c/caebbc60-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.147 + 100.64.52.147 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852849 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + caebbc60-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/caf01820-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/caf01820-8c0d-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60793332afa602a368358d1aa685deb94c8bada0 --- /dev/null +++ b/graph/incidents_graphml/c/caf01820-8c0d-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.216 + 100.64.16.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700970136 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + caf01820-8c0d-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/c/caf25c70-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/c/caf25c70-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77601322ffa370dc661de20b564f5ca928d28293 --- /dev/null +++ b/graph/incidents_graphml/c/caf25c70-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.5.80 + 172.29.5.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.94.76 + 100.64.94.76 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696198427 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + caf25c70-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198427 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + caf25c70-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/c/caf9c620-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/caf9c620-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fccaac5261a41038ee96dd79dd38128b008c298f --- /dev/null +++ b/graph/incidents_graphml/c/caf9c620-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.147 + 100.64.52.147 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852849 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + caf9c620-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/cafa1eb0-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/cafa1eb0-33da-11ed-bcaf-e3fcd610a254.graphml new file mode 100644 index 0000000000000000000000000000000000000000..665b93c2179957ba32c09b2e939033ff167e633a --- /dev/null +++ b/graph/incidents_graphml/c/cafa1eb0-33da-11ed-bcaf-e3fcd610a254.graphml @@ -0,0 +1,309 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.157 + 100.64.77.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.25 + 100.64.1.25 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.13 + 100.64.77.13 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.97 + 100.64.82.97 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.40 + 100.64.73.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.2.11 + 100.64.2.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.17 + 100.64.73.17 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.98 + 100.64.82.98 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.54.139 + 100.64.54.139 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + INCIDENT_LINK + 1663125031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cafa1eb0-33da-11ed-bcaf-e3fcd610a254 + + + diff --git a/graph/incidents_graphml/c/cb00b9f0-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/cb00b9f0-8c0d-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81af8909605c22ed88a3c4c409de507caf1241bb --- /dev/null +++ b/graph/incidents_graphml/c/cb00b9f0-8c0d-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.218 + 100.64.16.218 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700970136 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb00b9f0-8c0d-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/c/cb022f10-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/c/cb022f10-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..799c632b6e842ebdc359264d36f4e4e32a3ca1be --- /dev/null +++ b/graph/incidents_graphml/c/cb022f10-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.219 + 100.64.72.219 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.220 + 100.64.72.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.221 + USER-0015-1642.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687765259 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb022f10-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765259 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb022f10-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765259 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb022f10-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765259 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb022f10-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/c/cb067050-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cb067050-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d343a7d93bb687c6e78d6cd5bac49fc75ac5d37b --- /dev/null +++ b/graph/incidents_graphml/c/cb067050-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.149 + 100.64.52.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852849 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb067050-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/cb0b8080-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cb0b8080-5092-11ee-9f57-f5fa7d55d535.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51e052580d8f90bce38aab2900c029dc7dc50f69 --- /dev/null +++ b/graph/incidents_graphml/c/cb0b8080-5092-11ee-9f57-f5fa7d55d535.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694430189 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb0b8080-5092-11ee-9f57-f5fa7d55d535 + + + diff --git a/graph/incidents_graphml/c/cb0e4470-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/cb0e4470-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..279453ac1e60ba49f2492aacec0570b8fc1b6e78 --- /dev/null +++ b/graph/incidents_graphml/c/cb0e4470-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.94 + 100.64.43.94 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585369 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb0e4470-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/cb14b810-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/cb14b810-71eb-11ee-807d-75267aac45c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..597bf618fe5244d77a6113ff6f6833b069046eea --- /dev/null +++ b/graph/incidents_graphml/c/cb14b810-71eb-11ee-807d-75267aac45c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.202 + 100.64.10.202 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698096803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb14b810-71eb-11ee-807d-75267aac45c9 + + + diff --git a/graph/incidents_graphml/c/cb1550f0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/cb1550f0-0da9-11ee-812a-a702327978d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e0e930b1e64f138534255265a01237ec5d4e426 --- /dev/null +++ b/graph/incidents_graphml/c/cb1550f0-0da9-11ee-812a-a702327978d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.146 + 100.64.25.146 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687073340 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb1550f0-0da9-11ee-812a-a702327978d7 + + + diff --git a/graph/incidents_graphml/c/cb1871b0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cb1871b0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f237a17e95fe0cfe07a326296fad4b7a46a6054 --- /dev/null +++ b/graph/incidents_graphml/c/cb1871b0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.149 + 100.64.52.149 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852849 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb1871b0-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/cb1a2da0-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/cb1a2da0-a166-11ed-863f-a161c6cf34a1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1123bc1a56a10e2bd2ae8ff3b95b563517b8978a --- /dev/null +++ b/graph/incidents_graphml/c/cb1a2da0-a166-11ed-863f-a161c6cf34a1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.221 + 100.64.86.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675169838 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb1a2da0-a166-11ed-863f-a161c6cf34a1 + + + diff --git a/graph/incidents_graphml/c/cb1a7970-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/cb1a7970-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ddd671c116e24ccdcba962e8b407b785409ad58 --- /dev/null +++ b/graph/incidents_graphml/c/cb1a7970-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.231 + 100.64.55.231 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585369 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb1a7970-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/cb1c4e30-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb1c4e30-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f925816919cf0995f4581f2d843bc25955d62442 --- /dev/null +++ b/graph/incidents_graphml/c/cb1c4e30-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.117 + 100.64.29.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659111 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb1c4e30-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/cb1db010-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/cb1db010-a166-11ed-863f-a161c6cf34a1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..134cb79a92dd56d5cbf4d6aa26426a24b010f79e --- /dev/null +++ b/graph/incidents_graphml/c/cb1db010-a166-11ed-863f-a161c6cf34a1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.86.221 + 100.64.86.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675169838 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb1db010-a166-11ed-863f-a161c6cf34a1 + + + diff --git a/graph/incidents_graphml/c/cb201ad0-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cb201ad0-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99b32c0783c6bda628bf68f22c6dcaddb5a9d464 --- /dev/null +++ b/graph/incidents_graphml/c/cb201ad0-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.135.182 + 172.25.135.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.91.74 + 100.64.91.74 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.20.137.143 + 172.20.137.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + INCIDENT_LINK + 1695936005 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb201ad0-5e44-11ee-8e9d-87ef92e74986 + + + INCIDENT_LINK + 1695936005 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb201ad0-5e44-11ee-8e9d-87ef92e74986 + + + INCIDENT_LINK + 1695936005 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb201ad0-5e44-11ee-8e9d-87ef92e74986 + + + INCIDENT_LINK + 1695936005 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb201ad0-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/cb209e00-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/cb209e00-8c0d-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a297e85b60fbfa240e53ff5208119d6bcbb1232 --- /dev/null +++ b/graph/incidents_graphml/c/cb209e00-8c0d-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.202 + 100.64.16.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700970136 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb209e00-8c0d-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/c/cb22d910-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cb22d910-5092-11ee-9f57-f5fa7d55d535.graphml new file mode 100644 index 0000000000000000000000000000000000000000..271d0900e4ff0060e9f2d5ccec901453ee174337 --- /dev/null +++ b/graph/incidents_graphml/c/cb22d910-5092-11ee-9f57-f5fa7d55d535.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694430189 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb22d910-5092-11ee-9f57-f5fa7d55d535 + + + diff --git a/graph/incidents_graphml/c/cb246f80-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/cb246f80-71eb-11ee-807d-75267aac45c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ba07a0fbd1d4460bc09c97b9f9676f5521e4c0e --- /dev/null +++ b/graph/incidents_graphml/c/cb246f80-71eb-11ee-807d-75267aac45c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.202 + 100.64.10.202 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698096803 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb246f80-71eb-11ee-807d-75267aac45c9 + + + diff --git a/graph/incidents_graphml/c/cb283510-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/cb283510-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ab231d84d15e05bf6ed0f84aea109225bf50f35 --- /dev/null +++ b/graph/incidents_graphml/c/cb283510-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.231 + 100.64.55.231 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585369 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb283510-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/cb2cc8f0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb2cc8f0-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc23e4698591ec3acb6ae123304b1e6f20d833e3 --- /dev/null +++ b/graph/incidents_graphml/c/cb2cc8f0-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.117 + 100.64.29.117 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659111 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb2cc8f0-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/cb329f60-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/cb329f60-8c0d-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfc9356cd4b97c47c29986f49e01395678c47623 --- /dev/null +++ b/graph/incidents_graphml/c/cb329f60-8c0d-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.202 + 100.64.16.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700970136 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb329f60-8c0d-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/c/cb38f920-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cb38f920-5092-11ee-9f57-f5fa7d55d535.graphml new file mode 100644 index 0000000000000000000000000000000000000000..069b32c5fe869fc558ff6af58bf87fbde6f8a118 --- /dev/null +++ b/graph/incidents_graphml/c/cb38f920-5092-11ee-9f57-f5fa7d55d535.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.17 + 100.64.53.17 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694430190 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb38f920-5092-11ee-9f57-f5fa7d55d535 + + + diff --git a/graph/incidents_graphml/c/cb39c140-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb39c140-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cf50b42b6fc7a11632d97db6aae7f0e189d9df5 --- /dev/null +++ b/graph/incidents_graphml/c/cb39c140-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.119 + 100.64.29.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659111 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb39c140-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/cb4707b0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb4707b0-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad6a00e16cd6534f0d595c668cae30948bd55912 --- /dev/null +++ b/graph/incidents_graphml/c/cb4707b0-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.119 + 100.64.29.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659111 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb4707b0-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/cb4f9480-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cb4f9480-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b1d80a8b9abc279de929d4181dc263cf31b1220 --- /dev/null +++ b/graph/incidents_graphml/c/cb4f9480-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.193 + 100.64.71.193 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660142177 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb4f9480-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cb4f9ff0-2454-11ee-8059-d3725e6f3965.graphml b/graph/incidents_graphml/c/cb4f9ff0-2454-11ee-8059-d3725e6f3965.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49e83641eae64df4d4258760b0268c28b11db791 --- /dev/null +++ b/graph/incidents_graphml/c/cb4f9ff0-2454-11ee-8059-d3725e6f3965.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.121 + USER-0015-1242.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689565710 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb4f9ff0-2454-11ee-8059-d3725e6f3965 + + + diff --git a/graph/incidents_graphml/c/cb502aa0-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cb502aa0-5092-11ee-9f57-f5fa7d55d535.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e47ecba42cde6c764f5adf48f89ad32806f1ad46 --- /dev/null +++ b/graph/incidents_graphml/c/cb502aa0-5092-11ee-9f57-f5fa7d55d535.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.17 + 100.64.53.17 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694430190 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb502aa0-5092-11ee-9f57-f5fa7d55d535 + + + diff --git a/graph/incidents_graphml/c/cb55af00-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cb55af00-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..104afa032faee6c84f0241703da4dcc693db2807 --- /dev/null +++ b/graph/incidents_graphml/c/cb55af00-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.193 + 100.64.71.193 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660142177 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb55af00-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cb577ee0-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cb577ee0-350d-11ee-88fc-a9235afb9237.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b0ee5b0bffa7be8ed3865af933e4490e01a5b4f --- /dev/null +++ b/graph/incidents_graphml/c/cb577ee0-350d-11ee-88fc-a9235afb9237.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.220 + 100.64.76.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691404385 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb577ee0-350d-11ee-88fc-a9235afb9237 + + + diff --git a/graph/incidents_graphml/c/cb668710-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/cb668710-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb56a003f1c12ccbd1c84c24bbad023ae7cfd097 --- /dev/null +++ b/graph/incidents_graphml/c/cb668710-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.152 + 100.64.51.152 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685320135 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb668710-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/cb723270-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cb723270-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aafd4684b8b2dd4ce64a9480b03f5909d393f091 --- /dev/null +++ b/graph/incidents_graphml/c/cb723270-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.75 + 100.64.91.75 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695936005 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb723270-5e44-11ee-8e9d-87ef92e74986 + + + INCIDENT_LINK + 1695936005 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb723270-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/cb73dae0-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cb73dae0-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5558336ffca7c9686d38278c0c8008d59f9da0a3 --- /dev/null +++ b/graph/incidents_graphml/c/cb73dae0-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.191 + 100.64.15.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb73dae0-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/cb746a40-0373-11ed-8991-41244357ae3d.graphml b/graph/incidents_graphml/c/cb746a40-0373-11ed-8991-41244357ae3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96b31e36f62e996fe33b7ebe0f27f17ac8596ca3 --- /dev/null +++ b/graph/incidents_graphml/c/cb746a40-0373-11ed-8991-41244357ae3d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.36 + USER-0015-1724.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.19.171 + 100.64.19.171 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.45 + 100.64.77.45 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657803138 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb746a40-0373-11ed-8991-41244357ae3d + + + INCIDENT_LINK + 1657803138 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb746a40-0373-11ed-8991-41244357ae3d + + + INCIDENT_LINK + 1657803138 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb746a40-0373-11ed-8991-41244357ae3d + + + INCIDENT_LINK + 1657803138 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb746a40-0373-11ed-8991-41244357ae3d + + + diff --git a/graph/incidents_graphml/c/cb7ce4c0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb7ce4c0-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58d75efaa408b1bdc5deb924576a43ce7342e003 --- /dev/null +++ b/graph/incidents_graphml/c/cb7ce4c0-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.121 + 100.64.29.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb7ce4c0-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/cb7f8d50-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/cb7f8d50-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2be521f3879e03b6f880b04fb28328b6dbd9e6ff --- /dev/null +++ b/graph/incidents_graphml/c/cb7f8d50-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.51.152 + 100.64.51.152 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685320135 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb7f8d50-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/cb8078b0-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/cb8078b0-f6b2-11ee-b30f-810e76324c4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..235dc6a9fa0efd874871d183e4ca87ea4d960ed0 --- /dev/null +++ b/graph/incidents_graphml/c/cb8078b0-f6b2-11ee-b30f-810e76324c4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.5 + 100.64.17.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712695827 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb8078b0-f6b2-11ee-b30f-810e76324c4a + + + diff --git a/graph/incidents_graphml/c/cb82ad30-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cb82ad30-5e44-11ee-8e9d-87ef92e74986.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64618a45c59ec7526e0adf9d9239a7d54c73f5e5 --- /dev/null +++ b/graph/incidents_graphml/c/cb82ad30-5e44-11ee-8e9d-87ef92e74986.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.75 + 100.64.91.75 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695936006 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb82ad30-5e44-11ee-8e9d-87ef92e74986 + + + diff --git a/graph/incidents_graphml/c/cb82cf00-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cb82cf00-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5454491fa06a5f91cbfa688ef0f27448a50e571d --- /dev/null +++ b/graph/incidents_graphml/c/cb82cf00-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.191 + 100.64.15.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb82cf00-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/cb85dc00-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/c/cb85dc00-3b73-11ef-b1e4-3da31b742190.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87bf2db557fcbcc71c8d79d8dba68d3511fa6e5e --- /dev/null +++ b/graph/incidents_graphml/c/cb85dc00-3b73-11ef-b1e4-3da31b742190.graphml @@ -0,0 +1,207 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.36 + 100.64.46.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.37 + 100.64.46.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.6 + 100.64.12.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.222 + 100.64.37.222 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.38 + 100.64.46.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720255399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb85dc00-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb85dc00-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb85dc00-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb85dc00-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb85dc00-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb85dc00-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb85dc00-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb85dc00-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb85dc00-3b73-11ef-b1e4-3da31b742190 + + + diff --git a/graph/incidents_graphml/c/cb8a9360-9c1b-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/c/cb8a9360-9c1b-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a8e7615c2599c60c9910ddaf1533f1d9fd5e6c3 --- /dev/null +++ b/graph/incidents_graphml/c/cb8a9360-9c1b-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.3 + 100.64.79.3 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1674587871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb8a9360-9c1b-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/c/cb8d0dd0-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cb8d0dd0-350d-11ee-88fc-a9235afb9237.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b42be5affa454558fc79953ea0dc39f6cfe12e7 --- /dev/null +++ b/graph/incidents_graphml/c/cb8d0dd0-350d-11ee-88fc-a9235afb9237.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.54 + 100.64.77.54 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691404386 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cb8d0dd0-350d-11ee-88fc-a9235afb9237 + + + diff --git a/graph/incidents_graphml/c/cb8dada0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb8dada0-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b2e95d7f39ecb6b570e147008b73c5979aae593 --- /dev/null +++ b/graph/incidents_graphml/c/cb8dada0-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.123 + 100.64.29.123 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb8dada0-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/cb8fa040-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cb8fa040-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..660209b24f4cf6a25a9eb06371a53efc61c74109 --- /dev/null +++ b/graph/incidents_graphml/c/cb8fa040-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb8fa040-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/cb9c9b60-4dbd-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/c/cb9c9b60-4dbd-11ee-b251-912537db6da9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d8c85c75f549d284b7c473cf91097cabcf32b0e --- /dev/null +++ b/graph/incidents_graphml/c/cb9c9b60-4dbd-11ee-b251-912537db6da9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.253 + USER-0015-1537.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1694118805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb9c9b60-4dbd-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694118805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cb9c9b60-4dbd-11ee-b251-912537db6da9 + + + diff --git a/graph/incidents_graphml/c/cb9d6510-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb9d6510-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10d5792e0bd91e6eb8846ac88286b5bf2719242c --- /dev/null +++ b/graph/incidents_graphml/c/cb9d6510-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.123 + 100.64.29.123 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb9d6510-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/cb9d7590-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/cb9d7590-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea8bcfd84380aa911a200301db00027161bc34b9 --- /dev/null +++ b/graph/incidents_graphml/c/cb9d7590-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.203 + 100.64.26.203 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685320135 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cb9d7590-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/cb9df820-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cb9df820-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd7fc605f84b88f88ec2b96721cd9a2c1eec27fd --- /dev/null +++ b/graph/incidents_graphml/c/cb9df820-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb9df820-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/cb9e4430-0869-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/c/cb9e4430-0869-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13c33776a6a0f88aa64ab8fbc08a32302bcf948b --- /dev/null +++ b/graph/incidents_graphml/c/cb9e4430-0869-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.157 + 100.64.58.157 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714643595 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cb9e4430-0869-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/c/cba4c0d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cba4c0d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ed3802e7d572bba82f48e3dc5e7523b22158343 --- /dev/null +++ b/graph/incidents_graphml/c/cba4c0d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.158 + 100.64.35.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cba4c0d0-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/cbae5170-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cbae5170-350d-11ee-88fc-a9235afb9237.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e04627a80e9f15ed5818042a8622d0f928d5dbe --- /dev/null +++ b/graph/incidents_graphml/c/cbae5170-350d-11ee-88fc-a9235afb9237.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.54 + 100.64.77.54 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691404386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cbae5170-350d-11ee-88fc-a9235afb9237 + + + diff --git a/graph/incidents_graphml/c/cbb366d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cbb366d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c250b4ff9f138b9e5476869266e76251eadc4a23 --- /dev/null +++ b/graph/incidents_graphml/c/cbb366d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.158 + 100.64.35.158 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127333 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cbb366d0-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/cbb78d40-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/cbb78d40-fdb7-11ed-bfe2-118d4a616bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f78c21d948b6742e93b88758f8abea8f16c54719 --- /dev/null +++ b/graph/incidents_graphml/c/cbb78d40-fdb7-11ed-bfe2-118d4a616bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.26.203 + 100.64.26.203 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685320135 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cbb78d40-fdb7-11ed-bfe2-118d4a616bc2 + + + diff --git a/graph/incidents_graphml/c/cbb89740-f6d2-11ec-a9e6-87496a31758e.graphml b/graph/incidents_graphml/c/cbb89740-f6d2-11ec-a9e6-87496a31758e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a2839b70d8ba181a533b503ff5896d5a5ff66f5 --- /dev/null +++ b/graph/incidents_graphml/c/cbb89740-f6d2-11ec-a9e6-87496a31758e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.249 + 100.64.70.249 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656414576 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbb89740-f6d2-11ec-a9e6-87496a31758e + + + INCIDENT_LINK + 1656414576 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbb89740-f6d2-11ec-a9e6-87496a31758e + + + diff --git a/graph/incidents_graphml/c/cbc17090-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cbc17090-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..113a4fc2d401c75a0039bc6d5fe58da67b7d07ed --- /dev/null +++ b/graph/incidents_graphml/c/cbc17090-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.151 + 100.64.56.151 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbc17090-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/cbc41160-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/cbc41160-f6b2-11ee-b30f-810e76324c4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f82e3bc891ccf51c46da82145f861a573834986 --- /dev/null +++ b/graph/incidents_graphml/c/cbc41160-f6b2-11ee-b30f-810e76324c4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.153 + 100.64.52.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712695827 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cbc41160-f6b2-11ee-b30f-810e76324c4a + + + diff --git a/graph/incidents_graphml/c/cbc88900-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cbc88900-ff26-11ec-890e-b9233ab766d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17cca1e23efb1c8272e83458a37b9fe13dcbd2c1 --- /dev/null +++ b/graph/incidents_graphml/c/cbc88900-ff26-11ec-890e-b9233ab766d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.188 + 100.64.73.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657330263 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cbc88900-ff26-11ec-890e-b9233ab766d3 + + + diff --git a/graph/incidents_graphml/c/cbc8fdb0-0869-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/c/cbc8fdb0-0869-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a99c4c9a2b7e075c131a220996daaa1d0447093 --- /dev/null +++ b/graph/incidents_graphml/c/cbc8fdb0-0869-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.181 + 100.64.26.181 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714643595 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbc8fdb0-0869-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/c/cbcdd6a0-e280-11ee-bdbd-61ca27aa8970.graphml b/graph/incidents_graphml/c/cbcdd6a0-e280-11ee-bdbd-61ca27aa8970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce48bd1c2df94e8c7b0a82b62ad161406cd0df51 --- /dev/null +++ b/graph/incidents_graphml/c/cbcdd6a0-e280-11ee-bdbd-61ca27aa8970.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.1 + 100.64.62.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.149 + 100.64.11.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.244 + 100.64.8.244 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.1 + 100.64.62.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.187 + 100.64.34.187 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475329 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbcdd6a0-e280-11ee-bdbd-61ca27aa8970 + + + diff --git a/graph/incidents_graphml/c/cbd0b2d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cbd0b2d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b6386446085f2bd3e6499091086defffe2162ef --- /dev/null +++ b/graph/incidents_graphml/c/cbd0b2d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.151 + 100.64.56.151 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cbd0b2d0-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/cbd27ed0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cbd27ed0-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..626629ea702bcc1601ba82a7316c5bc5f90d5426 --- /dev/null +++ b/graph/incidents_graphml/c/cbd27ed0-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.125 + 100.64.29.125 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659112 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cbd27ed0-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/cbd53f40-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cbd53f40-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92bf0ddbba206342fb31eb3367652eabc4501706 --- /dev/null +++ b/graph/incidents_graphml/c/cbd53f40-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.10 + 100.64.71.10 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660142178 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbd53f40-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cbd86700-0869-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/c/cbd86700-0869-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e584dc6baf75c5c3321b3587f7d5cf29aeb5e21 --- /dev/null +++ b/graph/incidents_graphml/c/cbd86700-0869-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.181 + 100.64.26.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714643595 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cbd86700-0869-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/c/cbd909b0-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cbd909b0-5092-11ee-9f57-f5fa7d55d535.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3eb19a20308e50178d96b36c744ec7bb9346a922 --- /dev/null +++ b/graph/incidents_graphml/c/cbd909b0-5092-11ee-9f57-f5fa7d55d535.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.18 + 100.64.53.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694430191 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbd909b0-5092-11ee-9f57-f5fa7d55d535 + + + diff --git a/graph/incidents_graphml/c/cbda5880-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/cbda5880-f6b2-11ee-b30f-810e76324c4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ced2ea3e2f2a33295493bc3b693b1118a952508 --- /dev/null +++ b/graph/incidents_graphml/c/cbda5880-f6b2-11ee-b30f-810e76324c4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.132 + 100.64.37.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712695828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbda5880-f6b2-11ee-b30f-810e76324c4a + + + diff --git a/graph/incidents_graphml/c/cbdcb470-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cbdcb470-350d-11ee-88fc-a9235afb9237.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a01f73cfd65de2955977f0e4c311306b3e71877 --- /dev/null +++ b/graph/incidents_graphml/c/cbdcb470-350d-11ee-88fc-a9235afb9237.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.28 + 100.64.76.28 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691404386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbdcb470-350d-11ee-88fc-a9235afb9237 + + + diff --git a/graph/incidents_graphml/c/cbe031c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cbe031c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..527230c660847a0486f0e3f0a611b05efdabab01 --- /dev/null +++ b/graph/incidents_graphml/c/cbe031c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.231 + 100.64.24.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689180452 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe031c0-20d3-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/c/cbe23790-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cbe23790-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a049b28f164d60b67a7742b88e40945ea97d3ab --- /dev/null +++ b/graph/incidents_graphml/c/cbe23790-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.10 + 100.64.71.10 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660142178 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cbe23790-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cbe6bee0-0869-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/c/cbe6bee0-0869-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..053ba4dd64a648ab2dba51132abe79ab18770052 --- /dev/null +++ b/graph/incidents_graphml/c/cbe6bee0-0869-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.238 + 100.64.21.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714643595 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbe6bee0-0869-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/c/cbe80760-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/c/cbe80760-4e2d-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..090ebdeaccf3e59b755d2dae3c7d1cd14b1770a2 --- /dev/null +++ b/graph/incidents_graphml/c/cbe80760-4e2d-11ee-81da-13947cfea124.graphml @@ -0,0 +1,589 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.213 + 100.64.28.213 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.89 + 100.64.13.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.148 + 100.64.30.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.149 + 100.64.30.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.150 + 100.64.30.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.32 + 100.64.30.32 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.151 + USER-0015-1285.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.152 + 100.64.30.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.115 + 100.64.4.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.153 + 100.64.30.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.154 + 100.64.30.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.1 + 100.64.13.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.247 + 100.64.25.247 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.155 + 100.64.30.155 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbe80760-4e2d-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/c/cbe95d60-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cbe95d60-5092-11ee-9f57-f5fa7d55d535.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34d359dffeeef66d7f453b31f2dc3bdb2ef9edb6 --- /dev/null +++ b/graph/incidents_graphml/c/cbe95d60-5092-11ee-9f57-f5fa7d55d535.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.18 + 100.64.53.18 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694430191 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cbe95d60-5092-11ee-9f57-f5fa7d55d535 + + + diff --git a/graph/incidents_graphml/c/cbe9b840-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/cbe9b840-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9fb7fa4bc9a733e05070ec8e2cfce02532f1454b --- /dev/null +++ b/graph/incidents_graphml/c/cbe9b840-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.129 + 100.64.11.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.190.96.179 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1695779240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbe9b840-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/c/cbec32d0-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/cbec32d0-f6b2-11ee-b30f-810e76324c4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..711a522a80caf958853347aaa5ea6c2f4b578446 --- /dev/null +++ b/graph/incidents_graphml/c/cbec32d0-f6b2-11ee-b30f-810e76324c4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.132 + 100.64.37.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712695828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cbec32d0-f6b2-11ee-b30f-810e76324c4a + + + diff --git a/graph/incidents_graphml/c/cbefbee0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cbefbee0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccec725f1c48f885f2d5f712eb54a2694ef6510d --- /dev/null +++ b/graph/incidents_graphml/c/cbefbee0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.151 + 100.64.52.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697852850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbefbee0-6fb3-11ee-ad1d-0d1e6f8fec28 + + + diff --git a/graph/incidents_graphml/c/cbf6feb0-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/cbf6feb0-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85813923d190e8f1f83ffa05712988d0c567565c --- /dev/null +++ b/graph/incidents_graphml/c/cbf6feb0-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.190.96.179 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.11.129 + 100.64.11.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695779240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cbf6feb0-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/c/cbf872a0-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cbf872a0-ff26-11ec-890e-b9233ab766d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52a8dee8a1197b86ab834bde007c04382864b443 --- /dev/null +++ b/graph/incidents_graphml/c/cbf872a0-ff26-11ec-890e-b9233ab766d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.85 + 100.64.71.85 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657330263 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbf872a0-ff26-11ec-890e-b9233ab766d3 + + + diff --git a/graph/incidents_graphml/c/cbf8e9e0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cbf8e9e0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f8bcfad34180584b367efd8c17af1e3891dc5bf --- /dev/null +++ b/graph/incidents_graphml/c/cbf8e9e0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.231 + 100.64.24.231 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689180452 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cbf8e9e0-20d3-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/c/cbf9b110-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cbf9b110-5092-11ee-9f57-f5fa7d55d535.graphml new file mode 100644 index 0000000000000000000000000000000000000000..480da2c2023f12f470c5fe92a13e46004814c8fc --- /dev/null +++ b/graph/incidents_graphml/c/cbf9b110-5092-11ee-9f57-f5fa7d55d535.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.20 + 100.64.53.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694430191 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cbf9b110-5092-11ee-9f57-f5fa7d55d535 + + + diff --git a/graph/incidents_graphml/c/cbfcdf70-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cbfcdf70-ff26-11ec-890e-b9233ab766d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c2f2fb0b15bb25466984590397aa1be4915fa6f --- /dev/null +++ b/graph/incidents_graphml/c/cbfcdf70-ff26-11ec-890e-b9233ab766d3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.82 + 100.64.76.82 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.222 + 100.64.71.222 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657330263 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbfcdf70-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330263 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cbfcdf70-ff26-11ec-890e-b9233ab766d3 + + + diff --git a/graph/incidents_graphml/c/cc0439a0-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc0439a0-350d-11ee-88fc-a9235afb9237.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69307271a91956a92c958ca7539b5d10cea67de6 --- /dev/null +++ b/graph/incidents_graphml/c/cc0439a0-350d-11ee-88fc-a9235afb9237.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.28 + 100.64.76.28 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691404386 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc0439a0-350d-11ee-88fc-a9235afb9237 + + + diff --git a/graph/incidents_graphml/c/cc0bb270-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cc0bb270-5092-11ee-9f57-f5fa7d55d535.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3630045b6ac9556d257e33dcd42ae07f38684461 --- /dev/null +++ b/graph/incidents_graphml/c/cc0bb270-5092-11ee-9f57-f5fa7d55d535.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.20 + 100.64.53.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694430191 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cc0bb270-5092-11ee-9f57-f5fa7d55d535 + + + diff --git a/graph/incidents_graphml/c/cc1ccf90-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cc1ccf90-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3e654ba6fcdb0f6a9b767a0b714f7045685e505 --- /dev/null +++ b/graph/incidents_graphml/c/cc1ccf90-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.155 + 100.64.73.155 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660142179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc1ccf90-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cc1d18d0-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc1d18d0-350d-11ee-88fc-a9235afb9237.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbe1325b7f81b02a9a2697b70a37adbf9ab7d55a --- /dev/null +++ b/graph/incidents_graphml/c/cc1d18d0-350d-11ee-88fc-a9235afb9237.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.81 + 100.64.76.81 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691404387 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc1d18d0-350d-11ee-88fc-a9235afb9237 + + + diff --git a/graph/incidents_graphml/c/cc25cef0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cc25cef0-52a7-11ee-9df0-27ff5d272c1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77ce9fdf0a52d2098d4ddd6ef4629b72f226c9c8 --- /dev/null +++ b/graph/incidents_graphml/c/cc25cef0-52a7-11ee-9df0-27ff5d272c1e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.127 + 100.64.29.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694659113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cc25cef0-52a7-11ee-9df0-27ff5d272c1e + + + diff --git a/graph/incidents_graphml/c/cc269a80-e69d-11ee-8f7e-8d09b3cead02.graphml b/graph/incidents_graphml/c/cc269a80-e69d-11ee-8f7e-8d09b3cead02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..064b112a58bf10d13d863ac28fda57d4d075f6bc --- /dev/null +++ b/graph/incidents_graphml/c/cc269a80-e69d-11ee-8f7e-8d09b3cead02.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.24 + 100.64.18.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.230 + 100.64.48.230 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.254 + 100.64.8.254 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.181 + 100.64.56.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710927590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc269a80-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc269a80-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc269a80-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc269a80-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc269a80-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc269a80-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc269a80-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc269a80-e69d-11ee-8f7e-8d09b3cead02 + + + diff --git a/graph/incidents_graphml/c/cc29eef0-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cc29eef0-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c7dc5335a0545d78d8555fc748a12482b4eb2d7 --- /dev/null +++ b/graph/incidents_graphml/c/cc29eef0-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.155 + 100.64.73.155 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660142179 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc29eef0-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/c/cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..936e5646a5433261357f7897fd3116bae69b1365 --- /dev/null +++ b/graph/incidents_graphml/c/cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,517 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.104 + 100.64.32.104 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.108 + USER-0015-1328.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.224 + 100.64.50.224 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.250 + 100.64.7.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.129 + 100.64.17.129 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.68 + 100.64.40.68 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.8 + 100.64.64.8 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.9 + 100.64.64.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.10 + 100.64.64.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.11 + 100.64.64.11 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.12 + 100.64.64.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.13 + USER-0015-1458.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945948 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/c/cc314380-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/c/cc314380-085f-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..860c6117a844f455c97f7b2153057dd24ea10850 --- /dev/null +++ b/graph/incidents_graphml/c/cc314380-085f-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.251 + 100.64.53.251 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686491803 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc314380-085f-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/c/cc3221d0-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cc3221d0-6b4f-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6da5d0d4c1adbb7e12d42f5465655842829cda08 --- /dev/null +++ b/graph/incidents_graphml/c/cc3221d0-6b4f-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.41 + USER-0015-1211.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697370096 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc3221d0-6b4f-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/c/cc34a870-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/cc34a870-3245-11ef-9bb6-5bd0425d571b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc0bd77194ede41ced3eebbdcbfa1665ceb067ac --- /dev/null +++ b/graph/incidents_graphml/c/cc34a870-3245-11ef-9bb6-5bd0425d571b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.55.16 + USER-0015-1993.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.86.202 + 100.64.86.202 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719246083 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc34a870-3245-11ef-9bb6-5bd0425d571b + + + diff --git a/graph/incidents_graphml/c/cc386900-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc386900-350d-11ee-88fc-a9235afb9237.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a76ef65cf479f95b4beb6b16f828d417bec5a1b --- /dev/null +++ b/graph/incidents_graphml/c/cc386900-350d-11ee-88fc-a9235afb9237.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.81 + 100.64.76.81 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1691404387 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc386900-350d-11ee-88fc-a9235afb9237 + + + diff --git a/graph/incidents_graphml/c/cc39dea0-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/cc39dea0-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0070faf4120fdb224c371331e835db0c2f3c2626 --- /dev/null +++ b/graph/incidents_graphml/c/cc39dea0-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.151 + 100.64.26.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826880 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cc39dea0-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/cc4c12f0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cc4c12f0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ed01f79d02a1ea13626d8eede679f163bada8fe --- /dev/null +++ b/graph/incidents_graphml/c/cc4c12f0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.233 + 100.64.24.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689180453 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc4c12f0-20d3-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/c/cc4f2bc0-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/c/cc4f2bc0-085f-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..401c9ca02f9c3d0c23da4b670ae1c757db34cfc3 --- /dev/null +++ b/graph/incidents_graphml/c/cc4f2bc0-085f-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.251 + 100.64.53.251 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686491803 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc4f2bc0-085f-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/c/cc4f70d0-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/cc4f70d0-182c-11ee-b591-f5bec484f8bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cecf88b924d4a6c7016312f37e1855a026b7d9fd --- /dev/null +++ b/graph/incidents_graphml/c/cc4f70d0-182c-11ee-b591-f5bec484f8bc.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.88 + 100.64.73.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.90 + 100.64.73.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688229118 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc4f70d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229118 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc4f70d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229118 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc4f70d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229118 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc4f70d0-182c-11ee-b591-f5bec484f8bc + + + diff --git a/graph/incidents_graphml/c/cc4fb040-ee46-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/c/cc4fb040-ee46-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60c548da82da5cfb453275129fd033d0acf3d49b --- /dev/null +++ b/graph/incidents_graphml/c/cc4fb040-ee46-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.125 + 100.64.57.125 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711769833 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc4fb040-ee46-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/c/cc5486a0-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/cc5486a0-0725-11ee-9ff8-05edc9624e6c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a388692f51a945b62b53e0dd61f249663cf7b643 --- /dev/null +++ b/graph/incidents_graphml/c/cc5486a0-0725-11ee-9ff8-05edc9624e6c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.208 + 100.64.72.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686356941 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc5486a0-0725-11ee-9ff8-05edc9624e6c + + + diff --git a/graph/incidents_graphml/c/cc647d10-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/cc647d10-6618-11ee-9f91-2f1822361879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9448b9cf597c28d4a5ae5fbc6f78a789e320f3c8 --- /dev/null +++ b/graph/incidents_graphml/c/cc647d10-6618-11ee-9f91-2f1822361879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.181.72.179 + 10.181.72.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 172.23.203.103 + 172.23.203.103 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + INCIDENT_LINK + 1696796719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc647d10-6618-11ee-9f91-2f1822361879 + + + diff --git a/graph/incidents_graphml/c/cc64f740-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc64f740-350d-11ee-88fc-a9235afb9237.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6983eac01fbc3f14965057a2809df5009336ae9b --- /dev/null +++ b/graph/incidents_graphml/c/cc64f740-350d-11ee-88fc-a9235afb9237.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.34 + 100.64.75.34 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691404387 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc64f740-350d-11ee-88fc-a9235afb9237 + + + diff --git a/graph/incidents_graphml/c/cc6502c0-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/cc6502c0-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d45c9876933205cf49f44507e173004b41116816 --- /dev/null +++ b/graph/incidents_graphml/c/cc6502c0-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.36 + 100.64.52.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695779241 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc6502c0-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/c/cc6d44f0-2454-11ee-8059-d3725e6f3965.graphml b/graph/incidents_graphml/c/cc6d44f0-2454-11ee-8059-d3725e6f3965.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a80c3dd6904b34b6a2cbe8e150e1fcdfa7c64b99 --- /dev/null +++ b/graph/incidents_graphml/c/cc6d44f0-2454-11ee-8059-d3725e6f3965.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.123 + USER-0015-1243.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689565712 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc6d44f0-2454-11ee-8059-d3725e6f3965 + + + INCIDENT_LINK + 1689565712 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc6d44f0-2454-11ee-8059-d3725e6f3965 + + + INCIDENT_LINK + 1689565712 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc6d44f0-2454-11ee-8059-d3725e6f3965 + + + diff --git a/graph/incidents_graphml/c/cc6e0210-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/cc6e0210-0725-11ee-9ff8-05edc9624e6c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7766a87dc106e603020db491e6f9f12d6d05b2fa --- /dev/null +++ b/graph/incidents_graphml/c/cc6e0210-0725-11ee-9ff8-05edc9624e6c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.208 + 100.64.72.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686356942 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc6e0210-0725-11ee-9ff8-05edc9624e6c + + + diff --git a/graph/incidents_graphml/c/cc71e3f0-07d1-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/c/cc71e3f0-07d1-11ef-8107-af8140eb4c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90c84a0428cccebcc3b73b6f21515e77303416bc --- /dev/null +++ b/graph/incidents_graphml/c/cc71e3f0-07d1-11ef-8107-af8140eb4c5b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.106.136 + 172.21.106.136 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Apache Web Server"] + + + HOST + 100.64.86.254 + 100.64.86.254 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.255 + 100.64.86.255 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714578313 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc71e3f0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578313 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc71e3f0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578313 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc71e3f0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578313 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc71e3f0-07d1-11ef-8107-af8140eb4c5b + + + diff --git a/graph/incidents_graphml/c/cc724180-3c0f-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/c/cc724180-3c0f-11ee-96ec-5323ee82cf36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..353801229507fa6b855af1d09144bff09086bb9f --- /dev/null +++ b/graph/incidents_graphml/c/cc724180-3c0f-11ee-96ec-5323ee82cf36.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.201 + 100.64.68.201 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692174904 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc724180-3c0f-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692174904 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc724180-3c0f-11ee-96ec-5323ee82cf36 + + + diff --git a/graph/incidents_graphml/c/cc72e570-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/cc72e570-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0234d00d78919dec17b19a858598ecd3127dc236 --- /dev/null +++ b/graph/incidents_graphml/c/cc72e570-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.52.36 + 100.64.52.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695779241 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc72e570-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/c/cc782df0-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/cc782df0-3027-11ee-a433-a916fb2bb25a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b8343e07936bd32be1ac66c8592f218fffd2105 --- /dev/null +++ b/graph/incidents_graphml/c/cc782df0-3027-11ee-a433-a916fb2bb25a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1690865798 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc782df0-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865798 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc782df0-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865798 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc782df0-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865798 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc782df0-3027-11ee-a433-a916fb2bb25a + + + diff --git a/graph/incidents_graphml/c/cc7d0e20-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/cc7d0e20-6618-11ee-9f91-2f1822361879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4012754019ad280ee469622abd53e07fd941786 --- /dev/null +++ b/graph/incidents_graphml/c/cc7d0e20-6618-11ee-9f91-2f1822361879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.222 + 100.64.83.222 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696796719 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc7d0e20-6618-11ee-9f91-2f1822361879 + + + diff --git a/graph/incidents_graphml/c/cc7f9850-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/cc7f9850-170a-11ee-9198-135231c2dce9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27ee3ff249f85a7a161a0e4097c876d8f121dad2 --- /dev/null +++ b/graph/incidents_graphml/c/cc7f9850-170a-11ee-9198-135231c2dce9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.138 + 100.64.41.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688104564 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc7f9850-170a-11ee-9198-135231c2dce9 + + + diff --git a/graph/incidents_graphml/c/cc891b50-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/c/cc891b50-a4a5-11ed-b478-67badd244434.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83be2c2998b75b30b76bd1f66439a0111189579f --- /dev/null +++ b/graph/incidents_graphml/c/cc891b50-a4a5-11ed-b478-67badd244434.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.217 + 100.64.23.217 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.222 + 100.64.71.222 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.228 + 100.64.71.228 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.82.149 + 100.64.82.149 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.82.150 + 100.64.82.150 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.82.151 + 100.64.82.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1675526752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc891b50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc891b50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc891b50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc891b50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc891b50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc891b50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc891b50-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc891b50-a4a5-11ed-b478-67badd244434 + + + diff --git a/graph/incidents_graphml/c/cc89bd50-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc89bd50-350d-11ee-88fc-a9235afb9237.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7a2adaf65c8ef8fc82b0492034288817deb9e9a --- /dev/null +++ b/graph/incidents_graphml/c/cc89bd50-350d-11ee-88fc-a9235afb9237.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.34 + 100.64.75.34 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691404387 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc89bd50-350d-11ee-88fc-a9235afb9237 + + + diff --git a/graph/incidents_graphml/c/cc8b6600-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/cc8b6600-6618-11ee-9f91-2f1822361879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db471d4c24afa0bec30be140a8f137cbc15d5d10 --- /dev/null +++ b/graph/incidents_graphml/c/cc8b6600-6618-11ee-9f91-2f1822361879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.83.222 + 100.64.83.222 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696796719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cc8b6600-6618-11ee-9f91-2f1822361879 + + + diff --git a/graph/incidents_graphml/c/cc8d23e0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/cc8d23e0-0da9-11ee-812a-a702327978d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb750859ef4ef3ef987884ef3c3548541844d55e --- /dev/null +++ b/graph/incidents_graphml/c/cc8d23e0-0da9-11ee-812a-a702327978d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.148 + 100.64.25.148 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687073342 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc8d23e0-0da9-11ee-812a-a702327978d7 + + + diff --git a/graph/incidents_graphml/c/cc952840-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/c/cc952840-45d2-11ee-b6a5-451a7dc3db0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aded30ba8f5f43c944e6d41aba5e21f3cf72b985 --- /dev/null +++ b/graph/incidents_graphml/c/cc952840-45d2-11ee-b6a5-451a7dc3db0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.239 + USER-0015-2068.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693248217 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cc952840-45d2-11ee-b6a5-451a7dc3db0a + + + diff --git a/graph/incidents_graphml/c/cc974210-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/c/cc974210-29ad-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2efeef67e5cd9c3925b1ddd86c9c08797556b7c9 --- /dev/null +++ b/graph/incidents_graphml/c/cc974210-29ad-11ee-9959-8506340212c8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.47 + 100.64.63.47 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690153693 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cc974210-29ad-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/c/cc9c9940-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/c/cc9c9940-29ad-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29a118da42b73cdf2da24952f254aae3ca6dcaf6 --- /dev/null +++ b/graph/incidents_graphml/c/cc9c9940-29ad-11ee-9959-8506340212c8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.63.47 + 100.64.63.47 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690153693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cc9c9940-29ad-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/c/cca09b90-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cca09b90-20d3-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..326c33835d908c20c1d390f8608cd64f48757388 --- /dev/null +++ b/graph/incidents_graphml/c/cca09b90-20d3-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.235 + 100.64.24.235 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689180453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cca09b90-20d3-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/c/cca0f3b0-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cca0f3b0-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50ae440ec39bba92896a5ec4afa22adfc9e31322 --- /dev/null +++ b/graph/incidents_graphml/c/cca0f3b0-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.135 + 100.64.78.135 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660142179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cca0f3b0-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cca7f890-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cca7f890-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e295e202ce846231ef055b49678399a8df4e6db --- /dev/null +++ b/graph/incidents_graphml/c/cca7f890-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.135 + 100.64.78.135 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660142180 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cca7f890-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cca88020-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/c/cca88020-29ad-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2febec374f04bce3777480d0860d71817341f225 --- /dev/null +++ b/graph/incidents_graphml/c/cca88020-29ad-11ee-9959-8506340212c8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.28.128 + 100.64.28.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690153693 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cca88020-29ad-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/c/ccaaee10-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/ccaaee10-170a-11ee-9198-135231c2dce9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a1b4f85a561521964562fda032c10105a97c8b1 --- /dev/null +++ b/graph/incidents_graphml/c/ccaaee10-170a-11ee-9198-135231c2dce9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.138 + 100.64.41.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688104564 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccaaee10-170a-11ee-9198-135231c2dce9 + + + diff --git a/graph/incidents_graphml/c/ccaf2ad0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/ccaf2ad0-0da9-11ee-812a-a702327978d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87bb74c4aa663beb46cd28c9545510ed85082f0c --- /dev/null +++ b/graph/incidents_graphml/c/ccaf2ad0-0da9-11ee-812a-a702327978d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.148 + 100.64.25.148 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687073343 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccaf2ad0-0da9-11ee-812a-a702327978d7 + + + diff --git a/graph/incidents_graphml/c/ccb3ae80-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccb3ae80-6618-11ee-9f91-2f1822361879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac1691ee48e8ba2538fcaee45c70f80714ba0a7c --- /dev/null +++ b/graph/incidents_graphml/c/ccb3ae80-6618-11ee-9f91-2f1822361879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.132 + 100.64.9.132 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696796719 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ccb3ae80-6618-11ee-9f91-2f1822361879 + + + diff --git a/graph/incidents_graphml/c/ccbcb7c0-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccbcb7c0-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c92a34d48520b38bdb875671f955823eba2eb30e --- /dev/null +++ b/graph/incidents_graphml/c/ccbcb7c0-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.212 + 100.64.20.212 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585372 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ccbcb7c0-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/ccbf2010-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/ccbf2010-20d3-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad55acdce05088f2e53ff0335798e0aac1c51d72 --- /dev/null +++ b/graph/incidents_graphml/c/ccbf2010-20d3-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.235 + 100.64.24.235 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689180454 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccbf2010-20d3-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/c/ccc3db20-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccc3db20-6618-11ee-9f91-2f1822361879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f8c907f13d50add8e6f579fe49f4e9148d479cc --- /dev/null +++ b/graph/incidents_graphml/c/ccc3db20-6618-11ee-9f91-2f1822361879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.9.132 + 100.64.9.132 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696796719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccc3db20-6618-11ee-9f91-2f1822361879 + + + diff --git a/graph/incidents_graphml/c/ccc9fe30-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccc9fe30-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..461d09cb98a7f276c3515c76cd1bb769a1c5d9df --- /dev/null +++ b/graph/incidents_graphml/c/ccc9fe30-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.212 + 100.64.20.212 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585372 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccc9fe30-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/ccd3f0e0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/ccd3f0e0-0da9-11ee-812a-a702327978d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edd54c6b2ac8150ce5bff05cf6c7758d291f4947 --- /dev/null +++ b/graph/incidents_graphml/c/ccd3f0e0-0da9-11ee-812a-a702327978d7.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.230 + 100.64.20.230 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.150 + 100.64.25.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.151 + 100.64.25.151 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.152 + 100.64.25.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.153 + 100.64.25.153 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.51 + 100.64.25.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.154 + 100.64.25.154 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.155 + 100.64.25.155 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.156 + USER-0015-1256.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.247 + 100.64.6.247 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073343 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccd3f0e0-0da9-11ee-812a-a702327978d7 + + + diff --git a/graph/incidents_graphml/c/ccd63330-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccd63330-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d4571719e04ca932998d4a7917ef5aac379d5b9 --- /dev/null +++ b/graph/incidents_graphml/c/ccd63330-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.233 + 100.64.55.233 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585372 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ccd63330-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/ccd82670-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccd82670-6618-11ee-9f91-2f1822361879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7bfdbad1df557509b0704f386c053a9984d69a72 --- /dev/null +++ b/graph/incidents_graphml/c/ccd82670-6618-11ee-9f91-2f1822361879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.196 + 100.64.24.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1696796719 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ccd82670-6618-11ee-9f91-2f1822361879 + + + diff --git a/graph/incidents_graphml/c/ccdbb2c0-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/ccdbb2c0-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ceef1d0ba30a34e01cce44a95904379309eb0175 --- /dev/null +++ b/graph/incidents_graphml/c/ccdbb2c0-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.136 + USER-0015-1782.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660142180 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ccdbb2c0-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cce30470-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/cce30470-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc3d97f13f6e96c63d49aa4c5d7ec2ab60921ed5 --- /dev/null +++ b/graph/incidents_graphml/c/cce30470-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.233 + 100.64.55.233 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585372 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cce30470-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/cce3f020-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cce3f020-18b9-11ed-abbd-1d596f1eb890.graphml new file mode 100644 index 0000000000000000000000000000000000000000..339c29db95db48c8f845f98bd2e56127e96f8e5e --- /dev/null +++ b/graph/incidents_graphml/c/cce3f020-18b9-11ed-abbd-1d596f1eb890.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.136 + USER-0015-1782.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660142180 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cce3f020-18b9-11ed-abbd-1d596f1eb890 + + + diff --git a/graph/incidents_graphml/c/cce8b680-2454-11ee-8059-d3725e6f3965.graphml b/graph/incidents_graphml/c/cce8b680-2454-11ee-8059-d3725e6f3965.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bcc2dcbfc932f8f58b35977870291e97f6af7b09 --- /dev/null +++ b/graph/incidents_graphml/c/cce8b680-2454-11ee-8059-d3725e6f3965.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.187 + 100.64.16.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689565713 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cce8b680-2454-11ee-8059-d3725e6f3965 + + + INCIDENT_LINK + 1689565713 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cce8b680-2454-11ee-8059-d3725e6f3965 + + + diff --git a/graph/incidents_graphml/c/ccedf860-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccedf860-6618-11ee-9f91-2f1822361879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d61782c90c783667a1a73f4ff1251849ed7866d --- /dev/null +++ b/graph/incidents_graphml/c/ccedf860-6618-11ee-9f91-2f1822361879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.24.196 + 100.64.24.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696796719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccedf860-6618-11ee-9f91-2f1822361879 + + + diff --git a/graph/incidents_graphml/c/ccef3970-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccef3970-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f9b7f81a1114a3e21b0fcc513c3183970e985a0 --- /dev/null +++ b/graph/incidents_graphml/c/ccef3970-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.235 + 100.64.55.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585372 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ccef3970-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/ccf0bb30-1e11-11ee-9177-87bbc2825325.graphml b/graph/incidents_graphml/c/ccf0bb30-1e11-11ee-9177-87bbc2825325.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c6db03b2acf9ff0bd1fc58cb994bede7d361756 --- /dev/null +++ b/graph/incidents_graphml/c/ccf0bb30-1e11-11ee-9177-87bbc2825325.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.248 + 100.64.70.248 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688877229 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccf0bb30-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877229 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccf0bb30-1e11-11ee-9177-87bbc2825325 + + + diff --git a/graph/incidents_graphml/c/ccf26c10-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/c/ccf26c10-f75e-11ee-a8c3-edac19687c67.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46447565085fdd41f6baec1e6bcc5c7e8ff94c1c --- /dev/null +++ b/graph/incidents_graphml/c/ccf26c10-f75e-11ee-a8c3-edac19687c67.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.146 + 100.64.68.146 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","Okta","PAN NGFW"] + + + INCIDENT_LINK + 1712769703 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccf26c10-f75e-11ee-a8c3-edac19687c67 + + + diff --git a/graph/incidents_graphml/c/ccf31090-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/ccf31090-0725-11ee-9ff8-05edc9624e6c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f28d9fd7160c9b6770fa5e7661929d89a6cc69d --- /dev/null +++ b/graph/incidents_graphml/c/ccf31090-0725-11ee-9ff8-05edc9624e6c.graphml @@ -0,0 +1,99 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.209 + 100.64.72.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.15.183 + 100.64.15.183 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686356943 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccf31090-0725-11ee-9ff8-05edc9624e6c + + + INCIDENT_LINK + 1686356943 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccf31090-0725-11ee-9ff8-05edc9624e6c + + + INCIDENT_LINK + 1686356943 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ccf31090-0725-11ee-9ff8-05edc9624e6c + + + diff --git a/graph/incidents_graphml/c/ccf57950-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/c/ccf57950-f75e-11ee-a8c3-edac19687c67.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc55498cba2696730ba5c1845c4112ed475d25c2 --- /dev/null +++ b/graph/incidents_graphml/c/ccf57950-f75e-11ee-a8c3-edac19687c67.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Okta","PAN NGFW"] + + + HOST + 100.64.68.146 + 100.64.68.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712769703 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccf57950-f75e-11ee-a8c3-edac19687c67 + + + diff --git a/graph/incidents_graphml/c/ccfbb400-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccfbb400-6618-11ee-9f91-2f1822361879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38adfa101fefe985f063cd21fd0d9c7a2dc60962 --- /dev/null +++ b/graph/incidents_graphml/c/ccfbb400-6618-11ee-9f91-2f1822361879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.70 + 100.64.91.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696796720 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccfbb400-6618-11ee-9f91-2f1822361879 + + + diff --git a/graph/incidents_graphml/c/ccfc2510-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/ccfc2510-fa48-11ee-a230-bfe539a81cf2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f797bdc9526a46a37158af8d60e7371de749241 --- /dev/null +++ b/graph/incidents_graphml/c/ccfc2510-fa48-11ee-a230-bfe539a81cf2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.132 + 100.64.41.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713090107 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ccfc2510-fa48-11ee-a230-bfe539a81cf2 + + + diff --git a/graph/incidents_graphml/c/ccfe0680-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccfe0680-48e3-11ee-92d0-699b2a8ba251.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3145900a86eba2c2e270deaa2ee4131c7f861424 --- /dev/null +++ b/graph/incidents_graphml/c/ccfe0680-48e3-11ee-92d0-699b2a8ba251.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.235 + 100.64.55.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693585373 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ccfe0680-48e3-11ee-92d0-699b2a8ba251 + + + diff --git a/graph/incidents_graphml/c/cd07e820-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/c/cd07e820-3b73-11ef-b1e4-3da31b742190.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfc7f05e8a179c56292209c47199463f240503d4 --- /dev/null +++ b/graph/incidents_graphml/c/cd07e820-3b73-11ef-b1e4-3da31b742190.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.42 + 100.64.46.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.43 + 100.64.46.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.44 + 100.64.46.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.150 + 100.64.15.150 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.6 + 100.64.18.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.45 + 100.64.46.45 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.46 + 100.64.46.46 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.47 + 100.64.46.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.48 + 100.64.46.48 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255402 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd07e820-3b73-11ef-b1e4-3da31b742190 + + + diff --git a/graph/incidents_graphml/c/cd0906a0-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd0906a0-1528-11ee-98ae-5dea578eabb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1a0ab57266dfabb19ebd21e7708406d71782f46 --- /dev/null +++ b/graph/incidents_graphml/c/cd0906a0-1528-11ee-98ae-5dea578eabb6.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.1 + 100.64.34.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.8 + 100.64.74.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.64.22 + 100.64.64.22 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687897547 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0906a0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897547 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0906a0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897547 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0906a0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897547 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0906a0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897547 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0906a0-1528-11ee-98ae-5dea578eabb6 + + + diff --git a/graph/incidents_graphml/c/cd0ead10-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/c/cd0ead10-4e2d-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d9d406282d7f17fb550be743f02bbbcc92352b9 --- /dev/null +++ b/graph/incidents_graphml/c/cd0ead10-4e2d-11ee-81da-13947cfea124.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.164 + 100.64.30.164 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.252 + 100.64.26.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.43 + 100.64.14.43 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.165 + 100.64.30.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.150 + 100.64.30.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.166 + 100.64.30.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.167 + 100.64.30.167 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.168 + 100.64.30.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.169 + 100.64.30.169 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.140 + 100.64.23.140 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.216 + 100.64.14.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.170 + 100.64.30.170 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.171 + 100.64.30.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.202 + 100.64.14.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.172 + 100.64.30.172 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.173 + 100.64.30.173 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166911 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd0ead10-4e2d-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/c/cd11ad00-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/cd11ad00-6618-11ee-9f91-2f1822361879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2eaefb29724d570addb40ef1cb91ac5c84c414e2 --- /dev/null +++ b/graph/incidents_graphml/c/cd11ad00-6618-11ee-9f91-2f1822361879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.7.183 + 172.18.7.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.72 + USER-0015-2065.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696796720 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd11ad00-6618-11ee-9f91-2f1822361879 + + + diff --git a/graph/incidents_graphml/c/cd1b22c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cd1b22c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd90ca4c7bdfbe59aa3725ba47a05cc69dc48380 --- /dev/null +++ b/graph/incidents_graphml/c/cd1b22c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.237 + 100.64.24.237 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689180454 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd1b22c0-20d3-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/c/cd1f40c0-2675-11ed-bc50-5124b5e4dd90.graphml b/graph/incidents_graphml/c/cd1f40c0-2675-11ed-bc50-5124b5e4dd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e42d90d7a6af1d03175bfe30358defab8d33bac --- /dev/null +++ b/graph/incidents_graphml/c/cd1f40c0-2675-11ed-bc50-5124b5e4dd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.106 + 100.64.84.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1661652291 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cd1f40c0-2675-11ed-bc50-5124b5e4dd90 + + + diff --git a/graph/incidents_graphml/c/cd205510-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/cd205510-2d17-11ee-92ce-ad047e277e2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..803f05ab5cfdc346dfba333bcae7c0a55457ac34 --- /dev/null +++ b/graph/incidents_graphml/c/cd205510-2d17-11ee-92ce-ad047e277e2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.120 + 100.64.49.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690529074 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd205510-2d17-11ee-92ce-ad047e277e2c + + + diff --git a/graph/incidents_graphml/c/cd21ae70-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/cd21ae70-fa48-11ee-a230-bfe539a81cf2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbb30e04b152acf9161e211578773e2dee0fdd32 --- /dev/null +++ b/graph/incidents_graphml/c/cd21ae70-fa48-11ee-a230-bfe539a81cf2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.134 + 100.64.41.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713090108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cd21ae70-fa48-11ee-a230-bfe539a81cf2 + + + diff --git a/graph/incidents_graphml/c/cd223cc0-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/cd223cc0-3245-11ef-9bb6-5bd0425d571b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8902453dcf7c3e8245e4d193ec90b859076030ed --- /dev/null +++ b/graph/incidents_graphml/c/cd223cc0-3245-11ef-9bb6-5bd0425d571b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.203 + 100.64.86.203 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719246084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd223cc0-3245-11ef-9bb6-5bd0425d571b + + + diff --git a/graph/incidents_graphml/c/cd231e50-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd231e50-1528-11ee-98ae-5dea578eabb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aaf52581eba628d1e772300fc62b1b66f33e2d1b --- /dev/null +++ b/graph/incidents_graphml/c/cd231e50-1528-11ee-98ae-5dea578eabb6.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.226 + 100.64.1.226 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.202 + 100.64.77.202 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.203 + 100.64.77.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.24.249 + 100.64.24.249 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.204 + 100.64.77.204 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.11.235 + 100.64.11.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.18.38 + 100.64.18.38 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.48.17 + 100.64.48.17 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.3 + 100.64.72.3 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.205 + 100.64.77.205 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd231e50-1528-11ee-98ae-5dea578eabb6 + + + diff --git a/graph/incidents_graphml/c/cd3891d0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/cd3891d0-fa48-11ee-a230-bfe539a81cf2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6794dca6ffb6e650c32740171d7c0ed173bb5c90 --- /dev/null +++ b/graph/incidents_graphml/c/cd3891d0-fa48-11ee-a230-bfe539a81cf2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.134 + 100.64.41.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713090108 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd3891d0-fa48-11ee-a230-bfe539a81cf2 + + + diff --git a/graph/incidents_graphml/c/cd38a220-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd38a220-1528-11ee-98ae-5dea578eabb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..359620dd0dada44e7af4fc0e2230ffac3ea8942e --- /dev/null +++ b/graph/incidents_graphml/c/cd38a220-1528-11ee-98ae-5dea578eabb6.graphml @@ -0,0 +1,697 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.206 + 100.64.77.206 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.38 + 100.64.73.38 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.207 + 100.64.77.207 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.208 + 100.64.77.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.209 + 100.64.77.209 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.210 + 100.64.77.210 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.211 + 100.64.77.211 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.212 + 100.64.77.212 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.213 + 100.64.77.213 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.214 + 100.64.77.214 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.215 + 100.64.77.215 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.216 + 100.64.77.216 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.217 + USER-0015-1765.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.218 + 100.64.77.218 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.219 + 100.64.77.219 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.30.32 + 100.64.30.32 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.220 + 100.64.77.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.221 + USER-0015-1766.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.222 + 100.64.77.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd38a220-1528-11ee-98ae-5dea578eabb6 + + + diff --git a/graph/incidents_graphml/c/cd475dd0-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/cd475dd0-ee30-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ce3fd25b485a1c089c5af45ee9dda956e42f16d --- /dev/null +++ b/graph/incidents_graphml/c/cd475dd0-ee30-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.29 + 100.64.80.29 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465391 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cd475dd0-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465391 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cd475dd0-ee30-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/c/cd4987f0-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/cd4987f0-2d17-11ee-92ce-ad047e277e2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3537415499e4684383e358b74ae374aa4cbcaefb --- /dev/null +++ b/graph/incidents_graphml/c/cd4987f0-2d17-11ee-92ce-ad047e277e2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.39 + 100.64.19.39 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690529074 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cd4987f0-2d17-11ee-92ce-ad047e277e2c + + + diff --git a/graph/incidents_graphml/c/cd4a9a00-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/c/cd4a9a00-0823-11ee-af5c-6f7331aea810.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9446fd0d7967180a384a9d760b5bdb9ad43f060c --- /dev/null +++ b/graph/incidents_graphml/c/cd4a9a00-0823-11ee-af5c-6f7331aea810.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.247 + 100.64.55.247 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686466035 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd4a9a00-0823-11ee-af5c-6f7331aea810 + + + diff --git a/graph/incidents_graphml/c/cd4ffbe0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/c/cd4ffbe0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f14065b4f8badeedb1c7fada6ee537cd7fbcc82c --- /dev/null +++ b/graph/incidents_graphml/c/cd4ffbe0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.57.66 + 100.64.57.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685492796 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd4ffbe0-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/c/cd5800b0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/cd5800b0-fa48-11ee-a230-bfe539a81cf2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc69b224c35d7881e62144052a204b4e4b3a98e2 --- /dev/null +++ b/graph/incidents_graphml/c/cd5800b0-fa48-11ee-a230-bfe539a81cf2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.136 + 100.64.41.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713090108 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd5800b0-fa48-11ee-a230-bfe539a81cf2 + + + diff --git a/graph/incidents_graphml/c/cd628d40-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/c/cd628d40-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34f47480519f43618e2fcd75c5c2b60d3e400842 --- /dev/null +++ b/graph/incidents_graphml/c/cd628d40-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.222 + 100.64.72.222 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.130 + 100.64.72.130 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687765263 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd628d40-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765263 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd628d40-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/c/cd6462f0-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/cd6462f0-2d17-11ee-92ce-ad047e277e2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a84921fabf692a3d613565c0979301d1525c1c30 --- /dev/null +++ b/graph/incidents_graphml/c/cd6462f0-2d17-11ee-92ce-ad047e277e2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.39 + 100.64.19.39 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690529074 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cd6462f0-2d17-11ee-92ce-ad047e277e2c + + + diff --git a/graph/incidents_graphml/c/cd6b71f0-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd6b71f0-1528-11ee-98ae-5dea578eabb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a8a320191b09c6105cfa8331d6e010569f3efe6 --- /dev/null +++ b/graph/incidents_graphml/c/cd6b71f0-1528-11ee-98ae-5dea578eabb6.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.55 + 100.64.69.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.32 + 100.64.73.32 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.173 + 100.64.1.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.231 + USER-0015-1767.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd6b71f0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd6b71f0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd6b71f0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd6b71f0-1528-11ee-98ae-5dea578eabb6 + + + diff --git a/graph/incidents_graphml/c/cd704990-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/cd704990-3027-11ee-a433-a916fb2bb25a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddf6910bcd29e38fb00274e5f601f13dca79a880 --- /dev/null +++ b/graph/incidents_graphml/c/cd704990-3027-11ee-a433-a916fb2bb25a.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.30.32 + 100.64.30.32 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.74 + 100.64.69.74 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.75 + 100.64.69.75 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.12.189 + 100.64.12.189 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.76 + USER-0015-1518.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.53.192 + 100.64.53.192 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865800 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd704990-3027-11ee-a433-a916fb2bb25a + + + diff --git a/graph/incidents_graphml/c/cd792280-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/c/cd792280-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f061d9c1d008614b6745e052f68ec832c45e12b --- /dev/null +++ b/graph/incidents_graphml/c/cd792280-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.223 + 100.64.72.223 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.41 + 100.64.71.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.224 + 100.64.72.224 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687765263 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd792280-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765263 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd792280-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765263 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd792280-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765263 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd792280-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/c/cd82a740-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/c/cd82a740-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..813d3817948c52f9a69d14cf9e8f9690adc0f40c --- /dev/null +++ b/graph/incidents_graphml/c/cd82a740-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.42 + 100.64.86.42 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678199082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cd82a740-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/c/cd8550f0-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/c/cd8550f0-274f-11ee-9ae4-f7600c9ae4b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..622921abc3e165d68bf784234d7f1e107d7c249e --- /dev/null +++ b/graph/incidents_graphml/c/cd8550f0-274f-11ee-9ae4-f7600c9ae4b6.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.75 + 100.64.63.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.203 + 100.64.7.203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.128 + 100.64.25.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.189 + 100.64.14.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd8550f0-274f-11ee-9ae4-f7600c9ae4b6 + + + diff --git a/graph/incidents_graphml/c/cd869be0-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/c/cd869be0-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..efcbead69fa9035c88e0845619a8cd8b73ed0bd9 --- /dev/null +++ b/graph/incidents_graphml/c/cd869be0-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.198 + 172.25.216.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.78 + 100.64.94.78 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.79 + USER-0015-2110.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696198432 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd869be0-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198432 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd869be0-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198432 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd869be0-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198432 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd869be0-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/c/cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f09d3e29126f3e38f0fa9e4493523c0f8766cb7 --- /dev/null +++ b/graph/incidents_graphml/c/cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.239 + 100.64.24.239 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689180455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab + + + INCIDENT_LINK + 1689180455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab + + + INCIDENT_LINK + 1689180455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/c/cd94cbe0-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd94cbe0-1528-11ee-98ae-5dea578eabb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96c0f89e1ea014f4c8209b30a63b03bef53c6da9 --- /dev/null +++ b/graph/incidents_graphml/c/cd94cbe0-1528-11ee-98ae-5dea578eabb6.graphml @@ -0,0 +1,279 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.232 + 100.64.77.232 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.49 + 100.64.72.49 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.233 + 100.64.77.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.234 + 100.64.77.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.77.235 + 100.64.77.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.7.76 + 100.64.7.76 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.18.66 + 100.64.18.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd94cbe0-1528-11ee-98ae-5dea578eabb6 + + + diff --git a/graph/incidents_graphml/c/cd9821f0-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/c/cd9821f0-f75e-11ee-a8c3-edac19687c67.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae5ef46c2f0b7605b4d9c0d0169a6e24aee87f31 --- /dev/null +++ b/graph/incidents_graphml/c/cd9821f0-f75e-11ee-a8c3-edac19687c67.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.22.152 + 100.64.22.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712769704 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cd9821f0-f75e-11ee-a8c3-edac19687c67 + + + diff --git a/graph/incidents_graphml/c/cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/c/cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81d2860e1bd0d0d3ad64d85d6f518eb59d49caa5 --- /dev/null +++ b/graph/incidents_graphml/c/cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.77 + 100.64.63.77 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.110 + 100.64.23.110 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.2 + 100.64.18.2 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689893420 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893420 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6 + + + diff --git a/graph/incidents_graphml/c/cd9c1f70-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/c/cd9c1f70-10b5-11ee-aed8-b565505929b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..951889e0b5d4b1fb6dccb2d921fc8eba5efba325 --- /dev/null +++ b/graph/incidents_graphml/c/cd9c1f70-10b5-11ee-aed8-b565505929b5.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.61 + 100.64.68.61 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1687408351 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd9c1f70-10b5-11ee-aed8-b565505929b5 + + + INCIDENT_LINK + 1687408351 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cd9c1f70-10b5-11ee-aed8-b565505929b5 + + + diff --git a/graph/incidents_graphml/c/cda3c000-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cda3c000-1528-11ee-98ae-5dea578eabb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fff877ed6f7af02ba094d4fb17df2afcab491696 --- /dev/null +++ b/graph/incidents_graphml/c/cda3c000-1528-11ee-98ae-5dea578eabb6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.30.64 + 192.168.30.64 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.236 + 100.64.77.236 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687897548 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cda3c000-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897548 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cda3c000-1528-11ee-98ae-5dea578eabb6 + + + diff --git a/graph/incidents_graphml/c/cdbe59e0-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/cdbe59e0-170a-11ee-9198-135231c2dce9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f807db0690c3353fad9af550a54f3afedf5c6ab --- /dev/null +++ b/graph/incidents_graphml/c/cdbe59e0-170a-11ee-9198-135231c2dce9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.140 + 100.64.41.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688104566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdbe59e0-170a-11ee-9198-135231c2dce9 + + + diff --git a/graph/incidents_graphml/c/cdc1ea10-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cdc1ea10-20d3-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8f72e61f449f23903dc07451bc7616b69192421 --- /dev/null +++ b/graph/incidents_graphml/c/cdc1ea10-20d3-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.241 + 100.64.24.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689180455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc1ea10-20d3-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/c/cdc3bcc0-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cdc3bcc0-ff26-11ec-890e-b9233ab766d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c928357d7a75180b7a8e74bab26623951aeb8a6e --- /dev/null +++ b/graph/incidents_graphml/c/cdc3bcc0-ff26-11ec-890e-b9233ab766d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.83 + USER-0015-1733.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657330266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc3bcc0-ff26-11ec-890e-b9233ab766d3 + + + diff --git a/graph/incidents_graphml/c/cdc68a40-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cdc68a40-1528-11ee-98ae-5dea578eabb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f4734b8e3ccb30c9a3884e41b784918756f9b0f --- /dev/null +++ b/graph/incidents_graphml/c/cdc68a40-1528-11ee-98ae-5dea578eabb6.graphml @@ -0,0 +1,373 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.202 + 100.64.20.202 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.7.119 + 100.64.7.119 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.116 + 100.64.72.116 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.5.116 + 100.64.5.116 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.13.1 + 100.64.13.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.24.248 + 100.64.24.248 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + INCIDENT_LINK + 1687897549 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdc68a40-1528-11ee-98ae-5dea578eabb6 + + + diff --git a/graph/incidents_graphml/c/cdca4c70-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cdca4c70-ff26-11ec-890e-b9233ab766d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5842b969f58d3490fc531ba1a1552eed158f0a27 --- /dev/null +++ b/graph/incidents_graphml/c/cdca4c70-ff26-11ec-890e-b9233ab766d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.83 + USER-0015-1733.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657330266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdca4c70-ff26-11ec-890e-b9233ab766d3 + + + diff --git a/graph/incidents_graphml/c/cdccd6e0-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/cdccd6e0-3d6c-11ee-b209-c721199fad49.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d119ec295c2d0ebde2ed1a298b2ec51d2cbe9851 --- /dev/null +++ b/graph/incidents_graphml/c/cdccd6e0-3d6c-11ee-b209-c721199fad49.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.209 + 100.64.12.209 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692324801 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdccd6e0-3d6c-11ee-b209-c721199fad49 + + + diff --git a/graph/incidents_graphml/c/cdce2f60-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/c/cdce2f60-45d0-11ee-95ea-81d84bb304b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93d4d0b7e9e593e220a290a7e3abcadbf64cca0d --- /dev/null +++ b/graph/incidents_graphml/c/cdce2f60-45d0-11ee-95ea-81d84bb304b3.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.29 + 100.64.23.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.165 + USER-0015-1528.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.166 + 100.64.69.166 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.45.239 + 100.64.45.239 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.167 + 100.64.69.167 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdce2f60-45d0-11ee-95ea-81d84bb304b3 + + + diff --git a/graph/incidents_graphml/c/cdd55970-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/cdd55970-3d0b-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85a45cf655b90f6d0dac6d110518d45a21a702ca --- /dev/null +++ b/graph/incidents_graphml/c/cdd55970-3d0b-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.234 + 100.64.59.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdd55970-3d0b-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/c/cddc05d0-18e9-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/c/cddc05d0-18e9-11ef-94b0-d3858c4ed3ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7a155d2677f689026dacd33fb65a5db9d6a87d1 --- /dev/null +++ b/graph/incidents_graphml/c/cddc05d0-18e9-11ef-94b0-d3858c4ed3ac.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host"] + 0.841796875 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"] + + + HOST + 100.64.95.206 + 100.64.95.206 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.241 + 100.64.88.241 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.207 + 100.64.95.207 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716457793 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cddc05d0-18e9-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457793 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cddc05d0-18e9-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457793 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cddc05d0-18e9-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457793 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cddc05d0-18e9-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457793 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cddc05d0-18e9-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457793 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cddc05d0-18e9-11ef-94b0-d3858c4ed3ac + + + diff --git a/graph/incidents_graphml/c/cde25270-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/c/cde25270-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0851480da839febf0eddf5ad28ffb7873da54e72 --- /dev/null +++ b/graph/incidents_graphml/c/cde25270-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.34 + 100.64.81.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.53 + 100.64.73.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cde25270-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cde25270-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/c/cdeeae80-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/c/cdeeae80-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab413ade10908b5fecfed648c6d305b2188079ca --- /dev/null +++ b/graph/incidents_graphml/c/cdeeae80-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,755 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.35 + 100.64.81.35 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.36 + USER-0015-1858.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.79.88 + 100.64.79.88 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.37 + USER-0015-1859.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.38 + USER-0015-1860.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.16.113 + 100.64.16.113 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.39 + 100.64.81.39 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.40 + 100.64.81.40 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.244 + USER-0015-1861.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.44 + USER-0015-1862.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.41 + USER-0015-1863.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.42 + USER-0015-1864.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.43 + 100.64.81.43 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.44 + USER-0015-1865.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.45 + 100.64.81.45 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.46 + 100.64.81.46 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.239 + USER-0015-1607.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.47 + USER-0015-1866.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.130 + 100.64.77.130 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.48 + 100.64.81.48 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.49 + 100.64.81.49 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdeeae80-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/c/cdf21410-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/cdf21410-170a-11ee-9198-135231c2dce9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c65cadc3292008e103a89f80944de7b2adcc1ac4 --- /dev/null +++ b/graph/incidents_graphml/c/cdf21410-170a-11ee-9198-135231c2dce9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.140 + 100.64.41.140 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688104567 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cdf21410-170a-11ee-9198-135231c2dce9 + + + diff --git a/graph/incidents_graphml/c/cdf23040-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/cdf23040-3d0b-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d993a92b3482892aff45e2d775ca270d59180b58 --- /dev/null +++ b/graph/incidents_graphml/c/cdf23040-3d0b-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.234 + 100.64.59.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdf23040-3d0b-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/c/cdf71a30-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/c/cdf71a30-9773-11ed-8e25-218966643970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a85c9f52583598593537514281b8fda91086110a --- /dev/null +++ b/graph/incidents_graphml/c/cdf71a30-9773-11ed-8e25-218966643970.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1674075915 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cdf71a30-9773-11ed-8e25-218966643970 + + + INCIDENT_LINK + 1674075915 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cdf71a30-9773-11ed-8e25-218966643970 + + + diff --git a/graph/incidents_graphml/c/cdfa6e50-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/c/cdfa6e50-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7e289a7b9d7b399a7c4042ffca9cc7bb542c01a --- /dev/null +++ b/graph/incidents_graphml/c/cdfa6e50-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.71 + 100.64.81.71 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.49 + 100.64.72.49 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.250 + 100.64.71.250 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.2.136 + 100.64.2.136 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdfa6e50-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdfa6e50-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdfa6e50-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdfa6e50-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdfa6e50-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cdfa6e50-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/c/cdfae980-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/cdfae980-3245-11ef-9bb6-5bd0425d571b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ea4bb06db95963823b2b7d82031776c4fccb3fd --- /dev/null +++ b/graph/incidents_graphml/c/cdfae980-3245-11ef-9bb6-5bd0425d571b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.205 + USER-0015-1994.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1719246086 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cdfae980-3245-11ef-9bb6-5bd0425d571b + + + diff --git a/graph/incidents_graphml/c/ce03e9d0-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/c/ce03e9d0-9562-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5f8d8af3d66c15afab803145c688117d34a6864 --- /dev/null +++ b/graph/incidents_graphml/c/ce03e9d0-9562-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.26 + 100.64.65.26 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.156 + 100.64.72.156 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1673848711 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce03e9d0-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848711 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce03e9d0-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848711 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce03e9d0-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848711 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce03e9d0-9562-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/c/ce052250-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/c/ce052250-9562-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ac474c0c9a72d59a822672d97efd9b0d196d41a --- /dev/null +++ b/graph/incidents_graphml/c/ce052250-9562-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.160 + 100.64.78.160 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.224 + 100.64.71.224 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1673848711 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce052250-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848711 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce052250-9562-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/c/ce0ff170-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ce0ff170-3d0b-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13cbda38be82bd551c4a88ca955d697f3b14275a --- /dev/null +++ b/graph/incidents_graphml/c/ce0ff170-3d0b-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.110 + 100.64.35.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce0ff170-3d0b-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/c/ce1a29c0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/ce1a29c0-285f-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..106b6167c277c9559ef3305eb1683916c87523ea --- /dev/null +++ b/graph/incidents_graphml/c/ce1a29c0-285f-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.252 + 100.64.38.252 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718157741 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce1a29c0-285f-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/c/ce1b90e0-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/ce1b90e0-3245-11ef-9bb6-5bd0425d571b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43e9364c8e5d9cfb80e43cc89fa389c9303e683b --- /dev/null +++ b/graph/incidents_graphml/c/ce1b90e0-3245-11ef-9bb6-5bd0425d571b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.205 + USER-0015-1994.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719246086 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ce1b90e0-3245-11ef-9bb6-5bd0425d571b + + + diff --git a/graph/incidents_graphml/c/ce25a730-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/ce25a730-170a-11ee-9198-135231c2dce9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70e87f9b6feaeced7c74bf92f234fe64360a4910 --- /dev/null +++ b/graph/incidents_graphml/c/ce25a730-170a-11ee-9198-135231c2dce9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.57 + USER-0015-1332.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688104567 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ce25a730-170a-11ee-9198-135231c2dce9 + + + INCIDENT_LINK + 1688104567 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ce25a730-170a-11ee-9198-135231c2dce9 + + + diff --git a/graph/incidents_graphml/c/ce2a2e10-2698-11ef-9cc1-636a286f4a71.graphml b/graph/incidents_graphml/c/ce2a2e10-2698-11ef-9cc1-636a286f4a71.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f84db51c9634276b140b15d4bcf8afea0cc7d5e --- /dev/null +++ b/graph/incidents_graphml/c/ce2a2e10-2698-11ef-9cc1-636a286f4a71.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.111 + 100.64.34.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717962320 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce2a2e10-2698-11ef-9cc1-636a286f4a71 + + + INCIDENT_LINK + 1717962320 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce2a2e10-2698-11ef-9cc1-636a286f4a71 + + + diff --git a/graph/incidents_graphml/c/ce2a2f50-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/ce2a2f50-285f-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7301f1229f05ed226968cbef893e117584eb8c79 --- /dev/null +++ b/graph/incidents_graphml/c/ce2a2f50-285f-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.252 + 100.64.38.252 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718157741 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ce2a2f50-285f-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/c/ce2c7e80-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce2c7e80-4423-11ed-8338-1b551ccaa997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1e8a98d3a7cda661e1d7092993bec936435cffe --- /dev/null +++ b/graph/incidents_graphml/c/ce2c7e80-4423-11ed-8338-1b551ccaa997.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.44 + 100.64.75.44 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 172.21.30.204 + 172.21.30.204 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory","Cisco Meraki Firewall"] + + + HOST + 100.64.72.51 + 100.64.72.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1664915609 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce2c7e80-4423-11ed-8338-1b551ccaa997 + + + INCIDENT_LINK + 1664915609 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce2c7e80-4423-11ed-8338-1b551ccaa997 + + + INCIDENT_LINK + 1664915609 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce2c7e80-4423-11ed-8338-1b551ccaa997 + + + INCIDENT_LINK + 1664915609 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce2c7e80-4423-11ed-8338-1b551ccaa997 + + + diff --git a/graph/incidents_graphml/c/ce2f6050-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ce2f6050-3d0b-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7ebf8910d52fb2a00760ffaa1902ecca607380b --- /dev/null +++ b/graph/incidents_graphml/c/ce2f6050-3d0b-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.110 + 100.64.35.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ce2f6050-3d0b-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/c/ce3abe30-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/ce3abe30-89bb-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9c7fae9006c799b56caf41bc65b2234fb1aee58 --- /dev/null +++ b/graph/incidents_graphml/c/ce3abe30-89bb-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.87 + 100.64.33.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700715020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ce3abe30-89bb-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/c/ce47dd90-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/ce47dd90-89bb-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..685319f5fcad16fd1e8032aaeb6a1eb529d75962 --- /dev/null +++ b/graph/incidents_graphml/c/ce47dd90-89bb-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.95 + 100.64.42.95 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700715020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce47dd90-89bb-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/c/ce4b71b0-2698-11ef-9cc1-636a286f4a71.graphml b/graph/incidents_graphml/c/ce4b71b0-2698-11ef-9cc1-636a286f4a71.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e084099527db1d05ac4510750e16ff5e31bdb526 --- /dev/null +++ b/graph/incidents_graphml/c/ce4b71b0-2698-11ef-9cc1-636a286f4a71.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.111 + 100.64.34.111 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717962321 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ce4b71b0-2698-11ef-9cc1-636a286f4a71 + + + diff --git a/graph/incidents_graphml/c/ce4de6b0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/ce4de6b0-0da9-11ee-812a-a702327978d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18aff35dd5ff6b2c9756d519ee40a5d3c630f62d --- /dev/null +++ b/graph/incidents_graphml/c/ce4de6b0-0da9-11ee-812a-a702327978d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.164 + 100.64.25.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687073345 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce4de6b0-0da9-11ee-812a-a702327978d7 + + + diff --git a/graph/incidents_graphml/c/ce5339b0-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/c/ce5339b0-017b-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd3d14f7dcd6222db5295aa480eab8fc2db32ac1 --- /dev/null +++ b/graph/incidents_graphml/c/ce5339b0-017b-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.178.143 + 192.168.178.143 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 192.168.96.87 + 192.168.96.87 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685734175 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ce5339b0-017b-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685734175 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ce5339b0-017b-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/c/ce544d70-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ce544d70-3d0b-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a91b2350199b2fe3c8ab48aa53d44e54f96fdd9f --- /dev/null +++ b/graph/incidents_graphml/c/ce544d70-3d0b-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.235 + 100.64.59.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce544d70-3d0b-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/c/ce5c6de0-0829-11ef-9432-0316676438e6.graphml b/graph/incidents_graphml/c/ce5c6de0-0829-11ef-9432-0316676438e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79813731f306580958210ab699fbc0fb513527e5 --- /dev/null +++ b/graph/incidents_graphml/c/ce5c6de0-0829-11ef-9432-0316676438e6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.135.111 + 172.16.135.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory","Stealthwatch"] + + + HOST + 100.64.97.162 + 100.64.97.162 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714616112 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce5c6de0-0829-11ef-9432-0316676438e6 + + + INCIDENT_LINK + 1714616112 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce5c6de0-0829-11ef-9432-0316676438e6 + + + diff --git a/graph/incidents_graphml/c/ce5cec30-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/ce5cec30-89bb-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e67fb06e46c74623e35da74f8b42bf52761d8af4 --- /dev/null +++ b/graph/incidents_graphml/c/ce5cec30-89bb-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.95 + 100.64.42.95 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700715021 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ce5cec30-89bb-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/c/ce5fea90-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce5fea90-4423-11ed-8338-1b551ccaa997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e6601cd6fcc449efcdb4561f14e0556d88a0928 --- /dev/null +++ b/graph/incidents_graphml/c/ce5fea90-4423-11ed-8338-1b551ccaa997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.45 + 100.64.75.45 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1664915609 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce5fea90-4423-11ed-8338-1b551ccaa997 + + + diff --git a/graph/incidents_graphml/c/ce6c8e10-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/c/ce6c8e10-017b-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d88bb23a0556d9e0ef0775150b6fea82e53e70d --- /dev/null +++ b/graph/incidents_graphml/c/ce6c8e10-017b-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.79.215 + 100.64.79.215 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685734175 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ce6c8e10-017b-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/c/ce72d650-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce72d650-4423-11ed-8338-1b551ccaa997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cad82cb2fa72e07f7ebde2621399e0982cd58ae --- /dev/null +++ b/graph/incidents_graphml/c/ce72d650-4423-11ed-8338-1b551ccaa997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.75.45 + 100.64.75.45 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664915609 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ce72d650-4423-11ed-8338-1b551ccaa997 + + + diff --git a/graph/incidents_graphml/c/ce76f500-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce76f500-4423-11ed-8338-1b551ccaa997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0411db13a771ce116dd95f1ad34e47b097d13533 --- /dev/null +++ b/graph/incidents_graphml/c/ce76f500-4423-11ed-8338-1b551ccaa997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.46 + 100.64.75.46 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1664915609 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce76f500-4423-11ed-8338-1b551ccaa997 + + + diff --git a/graph/incidents_graphml/c/ce7a18b0-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/ce7a18b0-2d17-11ee-92ce-ad047e277e2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e59114234d1d0259324a3ca304ee0d67000e93c --- /dev/null +++ b/graph/incidents_graphml/c/ce7a18b0-2d17-11ee-92ce-ad047e277e2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.122 + 100.64.49.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690529076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce7a18b0-2d17-11ee-92ce-ad047e277e2c + + + diff --git a/graph/incidents_graphml/c/ce7d5da0-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce7d5da0-4423-11ed-8338-1b551ccaa997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fdfd8b560782397468b0745b7c118ea786ff73b --- /dev/null +++ b/graph/incidents_graphml/c/ce7d5da0-4423-11ed-8338-1b551ccaa997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.75.46 + 100.64.75.46 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1664915609 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ce7d5da0-4423-11ed-8338-1b551ccaa997 + + + diff --git a/graph/incidents_graphml/c/ce891910-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ce891910-3d0b-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2cf5466c26e876fda6c83eeb12188c4b695d3a4 --- /dev/null +++ b/graph/incidents_graphml/c/ce891910-3d0b-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.235 + 100.64.59.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ce891910-3d0b-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/c/ce945770-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/ce945770-2d17-11ee-92ce-ad047e277e2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ac03ca54ca92d402da38a6a386b42db38d8ff17 --- /dev/null +++ b/graph/incidents_graphml/c/ce945770-2d17-11ee-92ce-ad047e277e2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.122 + 100.64.49.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690529076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ce945770-2d17-11ee-92ce-ad047e277e2c + + + diff --git a/graph/incidents_graphml/c/ce9921a0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/ce9921a0-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..440bfa4745119481a60b37870299b60e926af40d --- /dev/null +++ b/graph/incidents_graphml/c/ce9921a0-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.166 + 100.64.19.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ce9921a0-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/ce9c2040-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/c/ce9c2040-0823-11ee-af5c-6f7331aea810.graphml new file mode 100644 index 0000000000000000000000000000000000000000..becc290bf70ed0a0bf87d2ea52309139c96b8a20 --- /dev/null +++ b/graph/incidents_graphml/c/ce9c2040-0823-11ee-af5c-6f7331aea810.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.249 + 100.64.55.249 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686466038 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce9c2040-0823-11ee-af5c-6f7331aea810 + + + diff --git a/graph/incidents_graphml/c/ce9dbb70-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/ce9dbb70-3d6c-11ee-b209-c721199fad49.graphml new file mode 100644 index 0000000000000000000000000000000000000000..067134d325552511a36b2c0cd308c4303c7dfada --- /dev/null +++ b/graph/incidents_graphml/c/ce9dbb70-3d6c-11ee-b209-c721199fad49.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.41 + 100.64.11.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692324802 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ce9dbb70-3d6c-11ee-b209-c721199fad49 + + + diff --git a/graph/incidents_graphml/c/cea7eeb0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cea7eeb0-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7429dc3918d6f2d07feb1e50211db013bdeecb5 --- /dev/null +++ b/graph/incidents_graphml/c/cea7eeb0-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.166 + 100.64.19.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cea7eeb0-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/ceaa9e90-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/ceaa9e90-2d17-11ee-92ce-ad047e277e2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49cb24f4b0855704ede73f91bf154f02a095065d --- /dev/null +++ b/graph/incidents_graphml/c/ceaa9e90-2d17-11ee-92ce-ad047e277e2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.124 + 100.64.49.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690529077 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ceaa9e90-2d17-11ee-92ce-ad047e277e2c + + + diff --git a/graph/incidents_graphml/c/ceaec830-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/c/ceaec830-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..755c06fd18cd858798efe140735ea74540384d44 --- /dev/null +++ b/graph/incidents_graphml/c/ceaec830-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.212.82 + 192.168.212.82 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.82 + USER-0015-2111.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.83 + USER-0015-2112.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696198433 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ceaec830-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198433 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ceaec830-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198433 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ceaec830-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198433 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ceaec830-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/c/ceb0f770-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/ceb0f770-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf768e7e7a3e9f056eb7e7d377aa1ed75f82460a --- /dev/null +++ b/graph/incidents_graphml/c/ceb0f770-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636652 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ceb0f770-5b8b-11ee-9925-ebc6745d6541 + + + diff --git a/graph/incidents_graphml/c/ceb58340-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/ceb58340-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..743c349d8098fa2d1f30951f37a1805e67fde1f5 --- /dev/null +++ b/graph/incidents_graphml/c/ceb58340-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.166 + 100.64.19.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ceb58340-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/cebcd770-f84f-11ec-8cad-d3b902a073da.graphml b/graph/incidents_graphml/c/cebcd770-f84f-11ec-8cad-d3b902a073da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a55f40eb173d09d9244bd6c77011ffb37d3b7ad --- /dev/null +++ b/graph/incidents_graphml/c/cebcd770-f84f-11ec-8cad-d3b902a073da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.245 + 100.64.70.245 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.246 + 100.64.70.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656578219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cebcd770-f84f-11ec-8cad-d3b902a073da + + + diff --git a/graph/incidents_graphml/c/cebf7660-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cebf7660-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..497ceaf742d39272490c128efd3bed42b635ac23 --- /dev/null +++ b/graph/incidents_graphml/c/cebf7660-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.240 + 100.64.12.240 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636652 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cebf7660-5b8b-11ee-9925-ebc6745d6541 + + + INCIDENT_LINK + 1695636652 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cebf7660-5b8b-11ee-9925-ebc6745d6541 + + + diff --git a/graph/incidents_graphml/c/cec4c580-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cec4c580-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ffff60720658368f27021b31f519719d0175fa0 --- /dev/null +++ b/graph/incidents_graphml/c/cec4c580-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.166 + 100.64.19.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127338 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cec4c580-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/cec528a0-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/c/cec528a0-a4a5-11ed-b478-67badd244434.graphml new file mode 100644 index 0000000000000000000000000000000000000000..017ca22d88fa0445122c2ae7ddcecaa9baa97b7e --- /dev/null +++ b/graph/incidents_graphml/c/cec528a0-a4a5-11ed-b478-67badd244434.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.90 + HOST-16410 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.82.152 + 100.64.82.152 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1675526756 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cec528a0-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526756 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cec528a0-a4a5-11ed-b478-67badd244434 + + + diff --git a/graph/incidents_graphml/c/ced1ae90-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/ced1ae90-2d17-11ee-92ce-ad047e277e2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f79a924c45c84924af104d47b39993c0ffd91efc --- /dev/null +++ b/graph/incidents_graphml/c/ced1ae90-2d17-11ee-92ce-ad047e277e2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.124 + 100.64.49.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690529077 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ced1ae90-2d17-11ee-92ce-ad047e277e2c + + + diff --git a/graph/incidents_graphml/c/ced2cf40-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/ced2cf40-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6e072f429fb58768b7c9018c2d6073f9531f574 --- /dev/null +++ b/graph/incidents_graphml/c/ced2cf40-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.44 + 100.64.40.44 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127338 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ced2cf40-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/ced2fe60-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/ced2fe60-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f89c49c4ebfb45a2f20180f785a7b23e7235eb88 --- /dev/null +++ b/graph/incidents_graphml/c/ced2fe60-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.240 + 100.64.12.240 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636652 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ced2fe60-5b8b-11ee-9925-ebc6745d6541 + + + diff --git a/graph/incidents_graphml/c/ced54900-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/ced54900-f6b2-11ee-b30f-810e76324c4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc2fbc12364eaaa4193036919ac341d1e5a0c8d7 --- /dev/null +++ b/graph/incidents_graphml/c/ced54900-f6b2-11ee-b30f-810e76324c4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.204 + 100.64.44.204 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712695833 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ced54900-f6b2-11ee-b30f-810e76324c4a + + + diff --git a/graph/incidents_graphml/c/cee1cab0-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cee1cab0-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b68ab15ead5f165c33b593a4b867765dd15a7b89 --- /dev/null +++ b/graph/incidents_graphml/c/cee1cab0-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.132 + 100.64.95.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673829815 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cee1cab0-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/c/cee21990-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cee21990-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a65c684de93b0a1cf357482c9287859edcf9956e --- /dev/null +++ b/graph/incidents_graphml/c/cee21990-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.40 + 100.64.18.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636652 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cee21990-5b8b-11ee-9925-ebc6745d6541 + + + diff --git a/graph/incidents_graphml/c/cee2f7f0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/c/cee2f7f0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e92117dd455bd094918a48e95b7ac04c6e1ca30 --- /dev/null +++ b/graph/incidents_graphml/c/cee2f7f0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.57.68 + 100.64.57.68 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685492798 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cee2f7f0-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/c/ceea8630-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/ceea8630-89bb-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02aa4b563fceae218a56a95224ec97363bfade11 --- /dev/null +++ b/graph/incidents_graphml/c/ceea8630-89bb-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.84 + 100.64.65.84 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700715021 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ceea8630-89bb-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/c/ceeb88c0-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ceeb88c0-4423-11ed-8338-1b551ccaa997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07fc1d89201030994137312f8acfff4891f6cc36 --- /dev/null +++ b/graph/incidents_graphml/c/ceeb88c0-4423-11ed-8338-1b551ccaa997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.47 + 100.64.75.47 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1664915610 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ceeb88c0-4423-11ed-8338-1b551ccaa997 + + + diff --git a/graph/incidents_graphml/c/ceeb8eb0-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/ceeb8eb0-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ca03a029983246e9daebaa9631e0436e2438a82 --- /dev/null +++ b/graph/incidents_graphml/c/ceeb8eb0-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.132 + 100.64.95.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673829815 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ceeb8eb0-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/c/cef04a60-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cef04a60-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f53d3fa7a40fde8d25341eccd4edd0db44261ce --- /dev/null +++ b/graph/incidents_graphml/c/cef04a60-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.40 + 100.64.18.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636652 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cef04a60-5b8b-11ee-9925-ebc6745d6541 + + + diff --git a/graph/incidents_graphml/c/cef37df0-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cef37df0-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16ad83ebd70700d59fe8e825e7922612243bfaaf --- /dev/null +++ b/graph/incidents_graphml/c/cef37df0-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.132 + 100.64.95.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673829815 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cef37df0-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/c/cef3b580-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/cef3b580-2d17-11ee-92ce-ad047e277e2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67a3fdbbe55bb5cf82deaa5c991dd5b0790172a4 --- /dev/null +++ b/graph/incidents_graphml/c/cef3b580-2d17-11ee-92ce-ad047e277e2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.251 + 100.64.18.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690529077 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cef3b580-2d17-11ee-92ce-ad047e277e2c + + + diff --git a/graph/incidents_graphml/c/cef63d10-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cef63d10-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f45712e4102da84042da5f4110d6453d34bce7c --- /dev/null +++ b/graph/incidents_graphml/c/cef63d10-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.71 + 100.64.71.71 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673829815 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cef63d10-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/c/cefa64b0-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/cefa64b0-89bb-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e7502da2aaa007dbf727e273be42b6c2425ae15 --- /dev/null +++ b/graph/incidents_graphml/c/cefa64b0-89bb-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.84 + 100.64.65.84 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700715022 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cefa64b0-89bb-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/c/cefb4620-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cefb4620-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..582b36aa30fe9bd5366f1edf4d8f8c2020f6137c --- /dev/null +++ b/graph/incidents_graphml/c/cefb4620-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.71.71 + 100.64.71.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673829815 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cefb4620-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/c/cefdde30-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cefdde30-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2988cdbc7cbd76414d575b9170f348f90cc0feea --- /dev/null +++ b/graph/incidents_graphml/c/cefdde30-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.134 + 100.64.95.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673829815 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cefdde30-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/c/cefe9450-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/c/cefe9450-085f-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4b1331cbb02e6c2b6a2d397518cbb69b08c7874 --- /dev/null +++ b/graph/incidents_graphml/c/cefe9450-085f-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.253 + 100.64.53.253 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686491808 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cefe9450-085f-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/c/cf015560-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/c/cf015560-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02df838e823c5040d60de81b2b9aeed67542a26c --- /dev/null +++ b/graph/incidents_graphml/c/cf015560-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.70 + 100.64.57.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685492799 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf015560-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/c/cf01fce0-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cf01fce0-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..463e27fe42f0d1492c29954c6d22ca474ba1fe83 --- /dev/null +++ b/graph/incidents_graphml/c/cf01fce0-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.134 + 100.64.95.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673829815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf01fce0-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/c/cf030860-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/cf030860-4423-11ed-8338-1b551ccaa997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98a785adcd7f16a8168eeed9e68729dd06431909 --- /dev/null +++ b/graph/incidents_graphml/c/cf030860-4423-11ed-8338-1b551ccaa997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.75.47 + 100.64.75.47 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664915610 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf030860-4423-11ed-8338-1b551ccaa997 + + + diff --git a/graph/incidents_graphml/c/cf04dd20-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/cf04dd20-4423-11ed-8338-1b551ccaa997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05edbc0144ec2e04e482f6e88b0297f42954b9ae --- /dev/null +++ b/graph/incidents_graphml/c/cf04dd20-4423-11ed-8338-1b551ccaa997.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.48 + 100.64.75.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.8 + 100.64.74.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1664915610 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf04dd20-4423-11ed-8338-1b551ccaa997 + + + INCIDENT_LINK + 1664915610 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf04dd20-4423-11ed-8338-1b551ccaa997 + + + diff --git a/graph/incidents_graphml/c/cf071b90-10d6-11ef-8c06-93e20871a0e5.graphml b/graph/incidents_graphml/c/cf071b90-10d6-11ef-8c06-93e20871a0e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53a4417a0421bbbbb041c02befe8153f6fe3758d --- /dev/null +++ b/graph/incidents_graphml/c/cf071b90-10d6-11ef-8c06-93e20871a0e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.9 + 100.64.25.9 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715570025 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf071b90-10d6-11ef-8c06-93e20871a0e5 + + + diff --git a/graph/incidents_graphml/c/cf0bdca0-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/c/cf0bdca0-4e2d-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac6bff16b3fcd01e83c088eb124ee6e95517f288 --- /dev/null +++ b/graph/incidents_graphml/c/cf0bdca0-4e2d-11ee-81da-13947cfea124.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.183 + 100.64.30.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.184 + 100.64.30.184 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.185 + 100.64.30.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.181 + 100.64.16.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.186 + 100.64.30.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.187 + 100.64.30.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.234 + 100.64.9.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.173 + 100.64.16.173 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.188 + 100.64.30.188 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.136 + 100.64.2.136 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.189 + 100.64.30.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.202 + USER-0015-1186.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.190 + 100.64.30.190 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.191 + 100.64.30.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.192 + 100.64.30.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.193 + 100.64.30.193 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.194 + 100.64.30.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.195 + 100.64.30.195 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.196 + 100.64.30.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166915 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0bdca0-4e2d-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/c/cf0dc8f0-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cf0dc8f0-ff26-11ec-890e-b9233ab766d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad172db07ecb64a26baf2806a628f0fe847e1a49 --- /dev/null +++ b/graph/incidents_graphml/c/cf0dc8f0-ff26-11ec-890e-b9233ab766d3.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.99 + 100.64.36.99 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.92 + 100.64.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.15.29 + 100.64.15.29 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.125 + 100.64.71.125 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.7.18 + 100.64.7.18 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.85 + 100.64.76.85 + ["Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.39 + 100.64.73.39 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.30.84 + 100.64.30.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.86 + 100.64.76.86 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.87 + 100.64.76.87 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.88 + 100.64.76.88 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.8.202 + USER-0015-1734.example.internal + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.89 + 100.64.76.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.90 + 100.64.76.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.91 + 100.64.76.91 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.92 + 100.64.76.92 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.240 + 100.64.71.240 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.90 + 100.64.71.90 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.67.59 + 100.64.67.59 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330268 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf0dc8f0-ff26-11ec-890e-b9233ab766d3 + + + diff --git a/graph/incidents_graphml/c/cf114b60-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cf114b60-ff26-11ec-890e-b9233ab766d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00e64e2e29a327d543f8a4c24c02e8c266e079eb --- /dev/null +++ b/graph/incidents_graphml/c/cf114b60-ff26-11ec-890e-b9233ab766d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.247 + 100.64.74.247 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657330268 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf114b60-ff26-11ec-890e-b9233ab766d3 + + + diff --git a/graph/incidents_graphml/c/cf1550a0-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/c/cf1550a0-085f-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..141919039ba3e0c10bc75acf98436640c107f0c1 --- /dev/null +++ b/graph/incidents_graphml/c/cf1550a0-085f-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.253 + 100.64.53.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686491808 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf1550a0-085f-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/c/cf182930-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cf182930-ff26-11ec-890e-b9233ab766d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..804e53ace494d3614292afc8d19c5a23bfd5a6a5 --- /dev/null +++ b/graph/incidents_graphml/c/cf182930-ff26-11ec-890e-b9233ab766d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.247 + 100.64.74.247 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657330269 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf182930-ff26-11ec-890e-b9233ab766d3 + + + diff --git a/graph/incidents_graphml/c/cf18a7c0-10d6-11ef-8c06-93e20871a0e5.graphml b/graph/incidents_graphml/c/cf18a7c0-10d6-11ef-8c06-93e20871a0e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..912cb58ec3b3fc4bbb8d5a7e5f6c063b99879eb6 --- /dev/null +++ b/graph/incidents_graphml/c/cf18a7c0-10d6-11ef-8c06-93e20871a0e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.9 + 100.64.25.9 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715570025 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf18a7c0-10d6-11ef-8c06-93e20871a0e5 + + + diff --git a/graph/incidents_graphml/c/cf1af7e0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/c/cf1af7e0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15f1794fb0f9f89e283d0b3b50eba06801c5f42e --- /dev/null +++ b/graph/incidents_graphml/c/cf1af7e0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.57.70 + 100.64.57.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685492799 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf1af7e0-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/c/cf240490-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cf240490-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aec74c5d60e5bf58ff5e888be56e9e6df38d6921 --- /dev/null +++ b/graph/incidents_graphml/c/cf240490-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.46 + 100.64.18.46 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636652 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf240490-5b8b-11ee-9925-ebc6745d6541 + + +