diff --git a/graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43e31ada3b44db2a657557ee70aac2e671c667b2
--- /dev/null
+++ b/graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.232
+ 100.64.41.232
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715276235
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c69d0810-0e2a-11ef-801a-2fb46581ffa8
+
+
+
diff --git a/graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b4104fed622d5c7fed2bfe6f1b0ac8ad0c03971
--- /dev/null
+++ b/graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.206
+ 100.64.46.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1704373461
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ba51759a10e60f7cc844010a1c6c11a3289d74a
--- /dev/null
+++ b/graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.41
+ 100.64.27.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713090097
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6a8e1d0-fa48-11ee-a230-bfe539a81cf2
+
+
+
diff --git a/graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ba4ce7b2ce7ddaa1e0dd5c6af42db47f197e9ea
--- /dev/null
+++ b/graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.203
+ 100.64.10.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.223
+ 100.64.13.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.39
+ 100.64.7.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689837573
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6acf940-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837573
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6acf940-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837573
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6acf940-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837573
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6acf940-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837573
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6acf940-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837573
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6acf940-26cd-11ee-863d-83828757c718
+
+
+
diff --git a/graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aefd07e474e897c95db95c1aac4dcee438b01ca0
--- /dev/null
+++ b/graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.161
+ 100.64.23.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959925
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bcab5a4253daab487686feeed427bb0fdf1da382
--- /dev/null
+++ b/graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.46.206
+ 100.64.46.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1704373461
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4db3e23c23dd7c32821024fc29a31629a357543c
--- /dev/null
+++ b/graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.234
+ 100.64.41.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715276235
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6bf3610-0e2a-11ef-801a-2fb46581ffa8
+
+
+
diff --git a/graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1dd5d5c634b24341728381e829f95f602f23457d
--- /dev/null
+++ b/graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.233
+ 100.64.76.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.51
+ 100.64.72.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688714869
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6dc4d70-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714869
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6dc4d70-1c97-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37c9534ccfbee30e6c0f5b86b08d430e911ab901
--- /dev/null
+++ b/graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.142
+ 100.64.15.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714908157
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f1c230-0ad1-11ef-8694-dbcc61061be0
+
+
+
diff --git a/graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1389c563b1ed5c6d51ed6fbbbf1640a732706a2
--- /dev/null
+++ b/graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.45
+ 100.64.40.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.195
+ 100.64.73.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.48.254
+ 100.64.48.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.64.154
+ 100.64.64.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688714869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6f1f850-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6f1f850-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6f1f850-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6f1f850-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6f1f850-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6f1f850-1c97-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f31fa4d6958a1fc46443d48c7515f8086b02f395
--- /dev/null
+++ b/graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.169
+ 100.64.80.169
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688490243
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6f59170-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490243
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6f59170-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+
diff --git a/graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdc04104d851a8bbbf82ee8af33d2ce358863836
--- /dev/null
+++ b/graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.33
+ 100.64.10.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.34
+ 100.64.10.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.35
+ 100.64.10.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.36
+ 100.64.10.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.30
+ 100.64.10.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.37
+ 100.64.10.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.38
+ 100.64.10.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.39
+ 100.64.10.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.40
+ 100.64.10.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.41
+ 100.64.10.41
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.42
+ 100.64.10.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.43
+ 100.64.10.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.44
+ 100.64.10.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.45
+ 100.64.10.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.48
+ 100.64.10.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.49
+ 100.64.10.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.50
+ 100.64.10.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6f8acf0-df14-11ee-9778-4184b1db151c
+
+
+
diff --git a/graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1d9bbfbb6339d28796feb5cc6cc95d84f31629a
--- /dev/null
+++ b/graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.92
+ 100.64.88.92
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1676271920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6fa8d40-ab6c-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e27f8a69dbbb92ce4609ab62e61f4db3ec9b84e2
--- /dev/null
+++ b/graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.92
+ 100.64.88.92
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676271920
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6ff4830-ab6c-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63f4725646390e003627dc41cf920805a1b57fc8
--- /dev/null
+++ b/graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.78
+ 100.64.30.78
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959925
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7167d60-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bac0077d5eca18dda665e78c3035308a8504e42
--- /dev/null
+++ b/graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.15
+ 100.64.31.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.67
+ 100.64.72.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686964241
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c721b500-0cab-11ee-8985-55bb832fcc7f
+
+
+
diff --git a/graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a4663c774855b657b9ff43127d59e70a0a91676
--- /dev/null
+++ b/graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.36.227
+ 192.168.36.227
+ []
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 10.110.41.138
+ 10.110.41.138
+ []
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370462
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1041","T1567"]
+ ["TA0009","TA0010"]
+ []
+ complete-mission
+ Disrupted
+ c72f7f50-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370462
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1041","T1567"]
+ ["TA0009","TA0010"]
+ []
+ complete-mission
+ Disrupted
+ c72f7f50-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d7987add9666112edb99769b09244d1cd13a642
--- /dev/null
+++ b/graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml
@@ -0,0 +1,169 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.72
+ 100.64.69.72
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.73
+ 100.64.69.73
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.325
+ ["Precinct"]
+
+
+ HOST
+ 100.64.58.41
+ 100.64.58.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690865789
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c7374510-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865789
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c7374510-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865789
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c7374510-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865789
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c7374510-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865789
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c7374510-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865789
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c7374510-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865789
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c7374510-3027-11ee-a433-a916fb2bb25a
+
+
+
diff --git a/graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b4a5c84cd8054e58684a06da8f772adad3bd409
--- /dev/null
+++ b/graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.176
+ 100.64.79.176
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370462
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c73b8d40-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370462
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c73b8d40-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25357e7c05aae4f804d9c486bbbc1c092a6fdcac
--- /dev/null
+++ b/graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.241
+ 100.64.9.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.193
+ 100.64.12.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690711171
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c74122b0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711171
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c74122b0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711171
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c74122b0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711171
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c74122b0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+
diff --git a/graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ecef143fbd7621b93bf547b9f02dd4f2791c9a3
--- /dev/null
+++ b/graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.243
+ 100.64.78.243
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688357958
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7418380-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cd5153dcbd1ac10b8210d7f53566d56e74aa47d
--- /dev/null
+++ b/graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.67
+ 100.64.72.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.31.15
+ 100.64.31.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686964241
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c746f040-0cab-11ee-8985-55bb832fcc7f
+
+
+
diff --git a/graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89fbe78530ee3a0e03e6f13b1fb8078264d1623a
--- /dev/null
+++ b/graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.69
+ 100.64.43.69
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585363
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c74f67b0-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90261e412e7647159d6fa81a18b8bdc27576b9d5
--- /dev/null
+++ b/graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.181
+ 100.64.2.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.107
+ 100.64.20.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721126411
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c74f6cc0-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126411
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c74f6cc0-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126411
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c74f6cc0-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126411
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c74f6cc0-435f-11ef-9e66-fd84d5bf3736
+
+
+
diff --git a/graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5fc1b2af02f3d1b29dd5e772a76017d7e2b7f099
--- /dev/null
+++ b/graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.201
+ 100.64.71.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688357958
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c75a62b0-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbb5174ffeb3bc5554ee6256d7c1c0dc8732f01f
--- /dev/null
+++ b/graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.75
+ USER-0015-2143.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ HOST-18911
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1704373462
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08f91050f5f9e9b48fc52a902ff45f9ad555c3db
--- /dev/null
+++ b/graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721126411
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c764f090-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126411
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c764f090-435f-11ef-9e66-fd84d5bf3736
+
+
+
diff --git a/graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb48a0f6df57a0a4d75de9a66e52e4c370da3c84
--- /dev/null
+++ b/graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.93
+ 100.64.71.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1673881342
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c767f340-95ae-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673881342
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c767f340-95ae-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39d05a2eeb931a96bdf3be42a10009cd75087f83
--- /dev/null
+++ b/graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ HOST-18911
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.17.75
+ USER-0015-2143.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704373462
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c7778580-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0827176836509592462679d4d649fccc99d34b7c
--- /dev/null
+++ b/graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.210
+ 100.64.72.210
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.211
+ 100.64.72.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.212
+ 100.64.72.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.125
+ 100.64.71.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.213
+ 100.64.72.213
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.49
+ 100.64.72.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.71
+ 100.64.7.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.214
+ 100.64.72.214
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.38.41
+ 100.64.38.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.50.138
+ USER-0015-1641.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.216
+ 100.64.72.216
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.217
+ 100.64.72.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.218
+ 100.64.72.218
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.39.224
+ 100.64.39.224
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7781df0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+
diff --git a/graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8c38c4e08dcfd6088b044f4166581efc055b6363
--- /dev/null
+++ b/graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.201
+ 100.64.71.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688357959
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c779f8a0-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5378b42824991799b376a8df546e2e99dca19ebc
--- /dev/null
+++ b/graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.20.130.86
+ 172.20.130.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.70
+ 100.64.92.70
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718052933
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c788a5e0-276b-11ef-b363-fdc4064c84e0
+
+
+ INCIDENT_LINK
+ 1718052933
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c788a5e0-276b-11ef-b363-fdc4064c84e0
+
+
+
diff --git a/graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9416453d1cbd5ebfa5437fb55d7647439a436dc
--- /dev/null
+++ b/graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.141
+ 100.64.86.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675134184
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7892d60-a113-11ed-b936-1349c6e38dc6
+
+
+
diff --git a/graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96dce959c42f31b962f42f784720c27394c004bd
--- /dev/null
+++ b/graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.222
+ 100.64.95.222
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1704373462
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c78c9420-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e791ffa2931595bbdb2bf6b6f3256d5bbd5ff07
--- /dev/null
+++ b/graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.141
+ 100.64.86.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675134184
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c78e8490-a113-11ed-b936-1349c6e38dc6
+
+
+
diff --git a/graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml b/graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f0e32808adc9ec51ff18233aedf8a9039f6de14
--- /dev/null
+++ b/graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.187
+ 100.64.9.187
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1701115300
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7a0fc90-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115300
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7a0fc90-8d5f-11ee-9951-411438339097
+
+
+
diff --git a/graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc9474edddc0d849a38e66918a59d3420cdb5375
--- /dev/null
+++ b/graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.222
+ 100.64.95.222
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704373462
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36ad825d640428543763e8175cfbe6ba9157f69c
--- /dev/null
+++ b/graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.244
+ 100.64.78.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688357959
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7a91ef0-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a4f50cd19f135b139e9cbb53369ce2f2d820644
--- /dev/null
+++ b/graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.10.137
+ 172.18.10.137
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.85.108
+ 100.64.85.108
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661712411
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7b0b290-2701-11ed-bc1f-0928ad8774f3
+
+
+ INCIDENT_LINK
+ 1661712411
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7b0b290-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..013d03fd6cd6080dd397ec98142d28490cf46f4a
--- /dev/null
+++ b/graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.248
+ 100.64.17.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.94.161
+ USER-0015-2120.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714983320
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7b63020-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983320
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7b63020-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983320
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7b63020-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983320
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7b63020-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+
diff --git a/graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..649a69a71f4501cf62295edb58b514dcab97b25d
--- /dev/null
+++ b/graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.77
+ 100.64.72.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.21
+ 100.64.73.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.930390625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.81
+ 100.64.82.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.82
+ 100.64.82.82
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.83
+ 100.64.82.83
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.103
+ 100.64.77.103
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.51
+ 100.64.73.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.84
+ 100.64.82.84
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.118
+ 100.64.72.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.85
+ 100.64.82.85
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.86
+ 100.64.82.86
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.238
+ 100.64.71.238
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.87
+ 100.64.82.87
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.88
+ 100.64.82.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.89
+ 100.64.82.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.90
+ 100.64.82.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.73
+ 100.64.72.73
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.91
+ 100.64.82.91
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.92
+ 100.64.82.92
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125026
+ malicious
+ 0.930390625
+ 0.930390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7b6da90-33da-11ed-bcaf-e3fcd610a254
+
+
+
diff --git a/graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f220ed292c9903fc360574b3f123543d0e9c31f5
--- /dev/null
+++ b/graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.233.197
+ 192.168.233.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.203
+ 100.64.72.203
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686356934
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7d05e10-0725-11ee-9ff8-05edc9624e6c
+
+
+ INCIDENT_LINK
+ 1686356934
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7d05e10-0725-11ee-9ff8-05edc9624e6c
+
+
+
diff --git a/graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f390da4064c9e9bdf7b2a5a4b05f8726ffe50bc8
--- /dev/null
+++ b/graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.244
+ 100.64.78.244
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688357959
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7d0cb30-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9ebfe847ed1df68563c28fec27e0a8d2cb05567
--- /dev/null
+++ b/graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.187
+ 100.64.18.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698307251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7e05460-73d5-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1eb81a285bba695405e8b7c3575e3aea26f66f2
--- /dev/null
+++ b/graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.31
+ 100.64.54.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959927
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c7e0f950-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ad138dd189533557c9452d2a04ae25cfc8986fe
--- /dev/null
+++ b/graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692324791
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7e17d30-3d6c-11ee-b209-c721199fad49
+
+
+
diff --git a/graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b306d08b2da4a8027a624c1d800a99dcf22674d
--- /dev/null
+++ b/graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.245
+ 100.64.78.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688357959
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7e4c860-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb46cc290d8b583c527d27ac15523a9810911910
--- /dev/null
+++ b/graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.50
+ 100.64.57.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695195977
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c7e82540-5789-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml b/graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e11181e5533185a4524be429ab929fb96406e0b8
--- /dev/null
+++ b/graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.115
+ 100.64.68.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.109
+ USER-0015-1627.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657803132
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7ea0b00-0373-11ed-8991-41244357ae3d
+
+
+ INCIDENT_LINK
+ 1657803132
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7ea0b00-0373-11ed-8991-41244357ae3d
+
+
+
diff --git a/graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bcd9c1be582f52305a3a9dd5b0dda1b6df5ba89
--- /dev/null
+++ b/graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.187
+ 100.64.18.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698307251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7f16b60-73d5-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/c/c7f878f0-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c7f878f0-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94902ac967f65c294f023282913c4ae15cc8aed7
--- /dev/null
+++ b/graph/incidents_graphml/c/c7f878f0-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.31
+ 100.64.54.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959927
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7f878f0-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c7fa5010-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/c/c7fa5010-a0fb-11ee-b868-0b39d8f52622.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e101459791a4a8d96b90f8ab90b762c189d8686e
--- /dev/null
+++ b/graph/incidents_graphml/c/c7fa5010-a0fb-11ee-b868-0b39d8f52622.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.194
+ 100.64.14.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703271374
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7fa5010-a0fb-11ee-b868-0b39d8f52622
+
+
+
diff --git a/graph/incidents_graphml/c/c7fd9480-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c7fd9480-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a47003f06a3cac3d3627da38a71b0c14b498762
--- /dev/null
+++ b/graph/incidents_graphml/c/c7fd9480-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.137
+ 100.64.66.137
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826873
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c7fd9480-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c7feff50-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/c/c7feff50-a4a5-11ed-b478-67badd244434.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14ef0374f8a622613224691c6e662380015fc40b
--- /dev/null
+++ b/graph/incidents_graphml/c/c7feff50-a4a5-11ed-b478-67badd244434.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.240
+ 100.64.71.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.82.148
+ 100.64.82.148
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1675526745
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7feff50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526745
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7feff50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526745
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7feff50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526745
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c7feff50-a4a5-11ed-b478-67badd244434
+
+
+
diff --git a/graph/incidents_graphml/c/c7ff4e10-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c7ff4e10-73d5-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3075ef6440a2820692e01f46dc84ee4a1a1d12b6
--- /dev/null
+++ b/graph/incidents_graphml/c/c7ff4e10-73d5-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.20
+ 100.64.67.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698307251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c7ff4e10-73d5-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/c/c80711f0-9c1b-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/c/c80711f0-9c1b-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2331796146fa396c20c26d007c8fc9bd0bc7858
--- /dev/null
+++ b/graph/incidents_graphml/c/c80711f0-9c1b-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.187
+ 100.64.71.187
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1674587865
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c80711f0-9c1b-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/c/c8096760-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c8096760-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2952855a6192482269a2872b64a936c5554c83a1
--- /dev/null
+++ b/graph/incidents_graphml/c/c8096760-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.245
+ 100.64.78.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8096760-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c8096b40-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/c/c8096b40-a0fb-11ee-b868-0b39d8f52622.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c581f9c2d9da88fff2ba099fe62b7a4be773d0b
--- /dev/null
+++ b/graph/incidents_graphml/c/c8096b40-a0fb-11ee-b868-0b39d8f52622.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.194
+ 100.64.14.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703271374
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8096b40-a0fb-11ee-b868-0b39d8f52622
+
+
+
diff --git a/graph/incidents_graphml/c/c80d30c0-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c80d30c0-73d5-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..086c52a83e49b4caef59514b2ab842d7ba5bf0cd
--- /dev/null
+++ b/graph/incidents_graphml/c/c80d30c0-73d5-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.20
+ 100.64.67.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698307251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c80d30c0-73d5-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/c/c80eab80-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c80eab80-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..180e17ad285cb6298e2cad4bbaa4c15d4afe36ca
--- /dev/null
+++ b/graph/incidents_graphml/c/c80eab80-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.139
+ 100.64.66.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c80eab80-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c80f3540-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c80f3540-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eaaffb0f4e3169d5b0b78d86acc273ade2fb71b8
--- /dev/null
+++ b/graph/incidents_graphml/c/c80f3540-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.148
+ 100.64.14.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959927
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c80f3540-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c811b050-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/c811b050-8c0d-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44fdc41f190e8378d830abcd531016f19dbab544
--- /dev/null
+++ b/graph/incidents_graphml/c/c811b050-8c0d-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.71
+ 100.64.7.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c811b050-8c0d-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/c/c81676b0-ea51-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/c/c81676b0-ea51-11ee-a5b0-ebb549372bba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be899a93b5fadc279ded7ff706a2edbbae9a4e4c
--- /dev/null
+++ b/graph/incidents_graphml/c/c81676b0-ea51-11ee-a5b0-ebb549372bba.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.43
+ 100.64.55.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ INCIDENT_LINK
+ 1711334746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c81676b0-ea51-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711334746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c81676b0-ea51-11ee-a5b0-ebb549372bba
+
+
+
diff --git a/graph/incidents_graphml/c/c81f7460-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c81f7460-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57476aa047a9daa104335646b674cd9f06896678
--- /dev/null
+++ b/graph/incidents_graphml/c/c81f7460-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.139
+ 100.64.66.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c81f7460-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c8270d10-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/c8270d10-8c0d-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3faf4a1011ac5b1949f72773455515170ae8dc2
--- /dev/null
+++ b/graph/incidents_graphml/c/c8270d10-8c0d-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,677 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.192
+ 100.64.16.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.193
+ 100.64.16.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.194
+ 100.64.16.194
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.195
+ 100.64.16.195
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.230
+ 100.64.10.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.196
+ 100.64.16.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.197
+ 100.64.16.197
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.198
+ 100.64.16.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.251
+ 100.64.13.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.199
+ 100.64.16.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.200
+ 100.64.16.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.26
+ 100.64.7.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.201
+ 100.64.16.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.202
+ 100.64.16.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.190
+ 100.64.16.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.203
+ 100.64.16.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700970131
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8270d10-8c0d-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/c/c827c650-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c827c650-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f605d58d32c47a73bb481b4304b8225666ed8ddf
--- /dev/null
+++ b/graph/incidents_graphml/c/c827c650-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.148
+ 100.64.14.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959927
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c827c650-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c82837e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c82837e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5357dfccf73ca816de53ec53982fa5986131c52a
--- /dev/null
+++ b/graph/incidents_graphml/c/c82837e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.224
+ 100.64.95.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1704373463
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c82837e0-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c82ed320-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/c82ed320-5cd7-11ee-9b5e-8914f9a5338d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c247d76081c856272770d4e5d80e02ee1bbffb12
--- /dev/null
+++ b/graph/incidents_graphml/c/c82ed320-5cd7-11ee-9b5e-8914f9a5338d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.191
+ 100.64.19.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695779234
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c82ed320-5cd7-11ee-9b5e-8914f9a5338d
+
+
+
diff --git a/graph/incidents_graphml/c/c8353250-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c8353250-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0569e77532b40ea849409a8cd9b1e221f8e8a168
--- /dev/null
+++ b/graph/incidents_graphml/c/c8353250-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.142
+ 100.64.76.142
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8353250-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c8369360-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c8369360-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2a362215b061d3a89558bf55d4c19f69c475344
--- /dev/null
+++ b/graph/incidents_graphml/c/c8369360-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.157
+ 100.64.47.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959927
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8369360-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c8371a00-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/c/c8371a00-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac06a2f7999a040cb586179d344b385c866f2333
--- /dev/null
+++ b/graph/incidents_graphml/c/c8371a00-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,93 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.3
+ 100.64.25.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.128
+ 100.64.80.128
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.254
+ 100.64.75.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.71
+ 100.64.74.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687010199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8371a00-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8371a00-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/c/c8399d00-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c8399d00-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f478818a16579560afe4ea339fe4079acf7ebc4b
--- /dev/null
+++ b/graph/incidents_graphml/c/c8399d00-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.224
+ 100.64.95.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704373463
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c8399d00-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c83aa310-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c83aa310-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60a37cd8d6d01b478cdada93cb3be15a400af565
--- /dev/null
+++ b/graph/incidents_graphml/c/c83aa310-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.112.183
+ 172.16.112.183
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.214
+ 100.64.90.214
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.215
+ 100.64.90.215
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661712412
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c83aa310-2701-11ed-bc1f-0928ad8774f3
+
+
+ INCIDENT_LINK
+ 1661712412
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c83aa310-2701-11ed-bc1f-0928ad8774f3
+
+
+ INCIDENT_LINK
+ 1661712412
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c83aa310-2701-11ed-bc1f-0928ad8774f3
+
+
+ INCIDENT_LINK
+ 1661712412
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c83aa310-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c83ba230-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c83ba230-276b-11ef-b363-fdc4064c84e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf9d2141492352325b0c1e54a9e1839594f760a1
--- /dev/null
+++ b/graph/incidents_graphml/c/c83ba230-276b-11ef-b363-fdc4064c84e0.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.23
+ 100.64.28.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1718052934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c83ba230-276b-11ef-b363-fdc4064c84e0
+
+
+ INCIDENT_LINK
+ 1718052934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c83ba230-276b-11ef-b363-fdc4064c84e0
+
+
+
diff --git a/graph/incidents_graphml/c/c83ba460-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/c83ba460-5cd7-11ee-9b5e-8914f9a5338d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3efc72520876494ccfad7a84807f5cc1e186d54
--- /dev/null
+++ b/graph/incidents_graphml/c/c83ba460-5cd7-11ee-9b5e-8914f9a5338d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.19.191
+ 100.64.19.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695779234
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c83ba460-5cd7-11ee-9b5e-8914f9a5338d
+
+
+
diff --git a/graph/incidents_graphml/c/c83d93d0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c83d93d0-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..738803bd584dcf4606363cc6282bb39ef7091cf9
--- /dev/null
+++ b/graph/incidents_graphml/c/c83d93d0-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.120
+ 100.64.64.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172854
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c83d93d0-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c83efca0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c83efca0-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8b238035406ff41314ca912cb30fc8227908b0c
--- /dev/null
+++ b/graph/incidents_graphml/c/c83efca0-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.42
+ 100.64.78.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.12
+ 100.64.77.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660528290
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c83efca0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528290
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c83efca0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/c/c84032a0-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c84032a0-a166-11ed-863f-a161c6cf34a1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd0782c24ab912f6e2aaf28da70970498c2821dd
--- /dev/null
+++ b/graph/incidents_graphml/c/c84032a0-a166-11ed-863f-a161c6cf34a1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.213
+ 100.64.86.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675169833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c84032a0-a166-11ed-863f-a161c6cf34a1
+
+
+
diff --git a/graph/incidents_graphml/c/c84194b0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c84194b0-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40b4c917caafa3421abdc3db10d0c7a39880b751
--- /dev/null
+++ b/graph/incidents_graphml/c/c84194b0-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.43
+ 100.64.78.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.159
+ 100.64.1.159
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660528290
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c84194b0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528290
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c84194b0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/c/c8442a40-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c8442a40-a166-11ed-863f-a161c6cf34a1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6e8a6f4bb57933bdff960a4984e2cdc04cf0a20
--- /dev/null
+++ b/graph/incidents_graphml/c/c8442a40-a166-11ed-863f-a161c6cf34a1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.213
+ 100.64.86.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675169833
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8442a40-a166-11ed-863f-a161c6cf34a1
+
+
+
diff --git a/graph/incidents_graphml/c/c848e2e0-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c848e2e0-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c4313d727f2b7f3632c9423409118fba362a252
--- /dev/null
+++ b/graph/incidents_graphml/c/c848e2e0-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.157
+ 100.64.47.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959927
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c848e2e0-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c84d2f30-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c84d2f30-0725-11ee-9ff8-05edc9624e6c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11ca1a616529d824b78b6e6b1b88622aab210d91
--- /dev/null
+++ b/graph/incidents_graphml/c/c84d2f30-0725-11ee-9ff8-05edc9624e6c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.204
+ 100.64.72.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686356935
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c84d2f30-0725-11ee-9ff8-05edc9624e6c
+
+
+
diff --git a/graph/incidents_graphml/c/c8511340-9c1b-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/c/c8511340-9c1b-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6512038073e77b5141135d0d791ba6bf9f5baac2
--- /dev/null
+++ b/graph/incidents_graphml/c/c8511340-9c1b-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.2
+ 100.64.79.2
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1674587865
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8511340-9c1b-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/c/c8553d70-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c8553d70-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbf59605abc1c8c44b403babce32132a136934c9
--- /dev/null
+++ b/graph/incidents_graphml/c/c8553d70-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.142
+ 100.64.76.142
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8553d70-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c8555900-9c1b-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/c/c8555900-9c1b-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e70c3cfa7319a9a57d3c6a6cb0a78029a07d1a1
--- /dev/null
+++ b/graph/incidents_graphml/c/c8555900-9c1b-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.79.2
+ 100.64.79.2
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1674587865
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8555900-9c1b-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/c/c858df40-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c858df40-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5420701f9bf0077a94992cf897d5d1d0d4286c5b
--- /dev/null
+++ b/graph/incidents_graphml/c/c858df40-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.190
+ 100.64.38.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c858df40-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/c85f02f0-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c85f02f0-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac3e1c8087ad4e89b4ca3059dc42f2bd59d18ae9
--- /dev/null
+++ b/graph/incidents_graphml/c/c85f02f0-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.177
+ 100.64.8.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959928
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c85f02f0-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c86247e0-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/c86247e0-170a-11ee-9198-135231c2dce9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96fcb2b14267aa7dba55982871777a9dda926c0f
--- /dev/null
+++ b/graph/incidents_graphml/c/c86247e0-170a-11ee-9198-135231c2dce9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.27
+ 100.64.21.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688104557
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86247e0-170a-11ee-9198-135231c2dce9
+
+
+
diff --git a/graph/incidents_graphml/c/c8641290-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c8641290-0725-11ee-9ff8-05edc9624e6c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72a4a67ec303184ade6e410c416fb74bc72153c3
--- /dev/null
+++ b/graph/incidents_graphml/c/c8641290-0725-11ee-9ff8-05edc9624e6c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.204
+ 100.64.72.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686356935
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8641290-0725-11ee-9ff8-05edc9624e6c
+
+
+
diff --git a/graph/incidents_graphml/c/c868a5a0-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c868a5a0-276b-11ef-b363-fdc4064c84e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5523924d1b41539ee8c910839e516fc2d99c1dfe
--- /dev/null
+++ b/graph/incidents_graphml/c/c868a5a0-276b-11ef-b363-fdc4064c84e0.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.89.242
+ 172.23.89.242
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.92.71
+ 100.64.92.71
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.72
+ 100.64.92.72
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718052934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c868a5a0-276b-11ef-b363-fdc4064c84e0
+
+
+ INCIDENT_LINK
+ 1718052934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c868a5a0-276b-11ef-b363-fdc4064c84e0
+
+
+ INCIDENT_LINK
+ 1718052934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c868a5a0-276b-11ef-b363-fdc4064c84e0
+
+
+
diff --git a/graph/incidents_graphml/c/c869c000-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c869c000-3d6c-11ee-b209-c721199fad49.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..527ba1932e3f6eead5adb1b72ec3698a198ed649
--- /dev/null
+++ b/graph/incidents_graphml/c/c869c000-3d6c-11ee-b209-c721199fad49.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.193
+ 100.64.12.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692324792
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c869c000-3d6c-11ee-b209-c721199fad49
+
+
+
diff --git a/graph/incidents_graphml/c/c86f2660-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c86f2660-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0d3dca5495d8de19549547b4b1e9123252d4872
--- /dev/null
+++ b/graph/incidents_graphml/c/c86f2660-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.190
+ 100.64.38.190
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169543
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c86f2660-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/c86fca50-1958-11ee-b3de-e709a8260af8.graphml b/graph/incidents_graphml/c/c86fca50-1958-11ee-b3de-e709a8260af8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..578615c80b06f138cf4eeaae65a3801ff295af6c
--- /dev/null
+++ b/graph/incidents_graphml/c/c86fca50-1958-11ee-b3de-e709a8260af8.graphml
@@ -0,0 +1,825 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.248
+ 100.64.78.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.220
+ 100.64.72.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.18.1
+ 100.64.18.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.86
+ 100.64.73.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.249
+ USER-0015-1798.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.130
+ 100.64.72.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.18.143
+ 100.64.18.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.24.248
+ 100.64.24.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.243
+ 100.64.71.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.82
+ 100.64.73.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.231
+ 100.64.10.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.250
+ 100.64.78.250
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.251
+ 100.64.78.251
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.183
+ 100.64.13.183
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.25.3
+ 100.64.25.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.209
+ 100.64.72.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.2
+ 100.64.77.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.119
+ 100.64.7.119
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.252
+ 100.64.78.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+ INCIDENT_LINK
+ 1688357960
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c86fca50-1958-11ee-b3de-e709a8260af8
+
+
+
diff --git a/graph/incidents_graphml/c/c87a0500-ddd0-11ee-a342-9d44f1915d3d.graphml b/graph/incidents_graphml/c/c87a0500-ddd0-11ee-a342-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3935b226618d8953029cb9532397cbcc8cc42492
--- /dev/null
+++ b/graph/incidents_graphml/c/c87a0500-ddd0-11ee-a342-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.177
+ 100.64.8.177
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709959928
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c87a0500-ddd0-11ee-a342-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/c/c87fc710-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/c/c87fc710-45d2-11ee-b6a5-451a7dc3db0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..759f442c5c10ce6c7d6c36b1dbf89b7091589040
--- /dev/null
+++ b/graph/incidents_graphml/c/c87fc710-45d2-11ee-b6a5-451a7dc3db0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.31
+ 100.64.36.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693248210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c87fc710-45d2-11ee-b6a5-451a7dc3db0a
+
+
+
diff --git a/graph/incidents_graphml/c/c88b0750-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c88b0750-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9764668a37b0ee832ffb7e8cc0962e42c97b7750
--- /dev/null
+++ b/graph/incidents_graphml/c/c88b0750-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.26
+ 100.64.14.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c88b0750-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c8912c30-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/c/c8912c30-45d2-11ee-b6a5-451a7dc3db0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7bdda01d584163e61cfc61f5fac81bd5148ae52
--- /dev/null
+++ b/graph/incidents_graphml/c/c8912c30-45d2-11ee-b6a5-451a7dc3db0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.36.31
+ 100.64.36.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693248210
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8912c30-45d2-11ee-b6a5-451a7dc3db0a
+
+
+
diff --git a/graph/incidents_graphml/c/c89271b0-7135-11ee-bce1-87535eed5229.graphml b/graph/incidents_graphml/c/c89271b0-7135-11ee-bce1-87535eed5229.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..741c993580180cdb56cad7bc79947504546e3b9b
--- /dev/null
+++ b/graph/incidents_graphml/c/c89271b0-7135-11ee-bce1-87535eed5229.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.75
+ 100.64.63.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698018630
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c89271b0-7135-11ee-bce1-87535eed5229
+
+
+
diff --git a/graph/incidents_graphml/c/c89708a0-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c89708a0-276b-11ef-b363-fdc4064c84e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70b78fd942430a0efa1c8fca92fb9d6baa720ffa
--- /dev/null
+++ b/graph/incidents_graphml/c/c89708a0-276b-11ef-b363-fdc4064c84e0.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.78
+ 100.64.92.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1718052935
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c89708a0-276b-11ef-b363-fdc4064c84e0
+
+
+ INCIDENT_LINK
+ 1718052935
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c89708a0-276b-11ef-b363-fdc4064c84e0
+
+
+
diff --git a/graph/incidents_graphml/c/c89c4560-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c89c4560-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e16d2926511b01c183233bab5f9a69e6cf238b22
--- /dev/null
+++ b/graph/incidents_graphml/c/c89c4560-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.26
+ 100.64.14.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363946
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c89c4560-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c89e33b0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/c89e33b0-285f-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59cb69200e6b88028bcf4ab1760b281b6fea7df5
--- /dev/null
+++ b/graph/incidents_graphml/c/c89e33b0-285f-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.222
+ 100.64.38.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c89e33b0-285f-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/c/c8aa4f20-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c8aa4f20-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f0d0ac2c88443a4a6e9386ba8381215fa19b5d3
--- /dev/null
+++ b/graph/incidents_graphml/c/c8aa4f20-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.30
+ 100.64.14.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8aa4f20-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c8ad27d0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/c8ad27d0-285f-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b4d38791bd5a052667d7b8c6f35738cc4cb05af
--- /dev/null
+++ b/graph/incidents_graphml/c/c8ad27d0-285f-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,741 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.226
+ 100.64.38.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.203
+ 100.64.37.203
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.227
+ 100.64.38.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.228
+ 100.64.38.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.229
+ 100.64.38.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.230
+ 100.64.38.230
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.193
+ 100.64.29.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.231
+ 100.64.38.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.232
+ 100.64.38.232
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.57
+ 100.64.30.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.233
+ 100.64.38.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.234
+ 100.64.38.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.31
+ 100.64.29.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.203
+ 100.64.10.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.235
+ 100.64.38.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.236
+ 100.64.38.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ad27d0-285f-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/c/c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/c/c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b4b2e10d75ce5ccd644df850ba9f74bc6b35620
--- /dev/null
+++ b/graph/incidents_graphml/c/c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b.graphml
@@ -0,0 +1,423 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.82
+ 100.64.17.82
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.69
+ 100.64.17.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.83
+ 100.64.17.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.17.84
+ 100.64.17.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.85
+ 100.64.17.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.211
+ 100.64.10.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.86
+ 100.64.17.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.87
+ 100.64.17.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.88
+ 100.64.17.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.220
+ 100.64.3.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ae4b10-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+
diff --git a/graph/incidents_graphml/c/c8b30100-fbb9-11ee-947f-6184d270644d.graphml b/graph/incidents_graphml/c/c8b30100-fbb9-11ee-947f-6184d270644d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a8fae02ab1112718de79b8c1ca0b18df545fcc8
--- /dev/null
+++ b/graph/incidents_graphml/c/c8b30100-fbb9-11ee-947f-6184d270644d.graphml
@@ -0,0 +1,323 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.119
+ 100.64.22.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.237
+ 100.64.56.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.99
+ 100.64.61.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.14
+ 100.64.65.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.29
+ 100.64.10.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.15
+ 100.64.65.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.158
+ 100.64.31.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8b30100-fbb9-11ee-947f-6184d270644d
+
+
+
diff --git a/graph/incidents_graphml/c/c8ba0690-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c8ba0690-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..557b5a109c3fe960ff40e905cbc43be812fabc0b
--- /dev/null
+++ b/graph/incidents_graphml/c/c8ba0690-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.30
+ 100.64.14.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363946
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8ba0690-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/c/c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf89fca1eddd5164d1ff44f7cc787e922f96a9d6
--- /dev/null
+++ b/graph/incidents_graphml/c/c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.96
+ 100.64.17.96
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.97
+ 100.64.17.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.50
+ 100.64.9.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.98
+ 100.64.17.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.60
+ 100.64.13.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.99
+ 100.64.17.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.100
+ 100.64.17.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.101
+ 100.64.17.101
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.102
+ 100.64.17.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.103
+ 100.64.17.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.149
+ 100.64.10.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.104
+ 100.64.17.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.105
+ 100.64.17.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.106
+ 100.64.17.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.107
+ 100.64.17.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030269
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba31f0-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+
diff --git a/graph/incidents_graphml/c/c8ba35b0-082a-11ef-9432-0316676438e6.graphml b/graph/incidents_graphml/c/c8ba35b0-082a-11ef-9432-0316676438e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8ffe2b6789de4552a2e939f638e65fad1cb4c28
--- /dev/null
+++ b/graph/incidents_graphml/c/c8ba35b0-082a-11ef-9432-0316676438e6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.20.181.243
+ 172.20.181.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.163
+ 100.64.97.163
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714616532
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba35b0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616532
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ba35b0-082a-11ef-9432-0316676438e6
+
+
+
diff --git a/graph/incidents_graphml/c/c8bf2a10-1172-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/c/c8bf2a10-1172-11ef-98dd-db867c05f09b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7683dc384b6bcde2b89b05a939bcd9dbe3be408f
--- /dev/null
+++ b/graph/incidents_graphml/c/c8bf2a10-1172-11ef-98dd-db867c05f09b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.73.174
+ 172.30.73.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.49
+ 100.64.97.49
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715637016
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8bf2a10-1172-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637016
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8bf2a10-1172-11ef-98dd-db867c05f09b
+
+
+
diff --git a/graph/incidents_graphml/c/c8bf8a80-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8bf8a80-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7016c5530649a44b21d4ef23f4db02510735947
--- /dev/null
+++ b/graph/incidents_graphml/c/c8bf8a80-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.216
+ 100.64.90.216
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661712413
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8bf8a80-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c8c25270-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/c8c25270-182c-11ee-b591-f5bec484f8bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13098bfec84b0df1fb1454be6d0edbd818472538
--- /dev/null
+++ b/graph/incidents_graphml/c/c8c25270-182c-11ee-b591-f5bec484f8bc.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.85
+ 100.64.73.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.29.51
+ 100.64.29.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688229112
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8c25270-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229112
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8c25270-182c-11ee-b591-f5bec484f8bc
+
+
+
diff --git a/graph/incidents_graphml/c/c8c49390-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8c49390-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fca69b6452beff3301a2bc80e33e86936d36bdc6
--- /dev/null
+++ b/graph/incidents_graphml/c/c8c49390-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.216
+ 100.64.90.216
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661712413
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8c49390-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c8cbb9d0-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c8cbb9d0-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae1a1e6593a5fe1396f530823b0464d3376db613
--- /dev/null
+++ b/graph/incidents_graphml/c/c8cbb9d0-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.32
+ 100.64.14.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8cbb9d0-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c8ccd0f0-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8ccd0f0-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d7ab3c0c000b9e8cb379ed347648d1829078c94
--- /dev/null
+++ b/graph/incidents_graphml/c/c8ccd0f0-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.69.2
+ 100.64.69.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661712413
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c8ccd0f0-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c8d9b610-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/c8d9b610-285f-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be98725def465c8c6bb8202b6fa307b414dece29
--- /dev/null
+++ b/graph/incidents_graphml/c/c8d9b610-285f-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.250
+ 100.64.38.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718157732
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8d9b610-285f-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/c/c8db7140-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c8db7140-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5b247ac9948b4857169cc1df348f7cda7ad6449
--- /dev/null
+++ b/graph/incidents_graphml/c/c8db7140-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.32
+ 100.64.14.32
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363946
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8db7140-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c8de8430-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8de8430-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..501a8fdd37fe1e62f59e8df23bd2bc8fb7f1235b
--- /dev/null
+++ b/graph/incidents_graphml/c/c8de8430-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.218
+ 100.64.90.218
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661712413
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8de8430-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c8e38f80-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/c/c8e38f80-131d-11ee-8854-7b8acd154f2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab518391b9df7ed042db82b22286cbccf40eb4fe
--- /dev/null
+++ b/graph/incidents_graphml/c/c8e38f80-131d-11ee-8854-7b8acd154f2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.36
+ 100.64.53.36
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687672914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8e38f80-131d-11ee-8854-7b8acd154f2f
+
+
+
diff --git a/graph/incidents_graphml/c/c8e9bba0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/c8e9bba0-285f-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52bf56f12d23f5366b9e41b219a67aa8ce88a621
--- /dev/null
+++ b/graph/incidents_graphml/c/c8e9bba0-285f-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.250
+ 100.64.38.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718157733
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8e9bba0-285f-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/c/c8eae040-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8eae040-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95ee8668e58a89c3df912677f2b01e92102208ba
--- /dev/null
+++ b/graph/incidents_graphml/c/c8eae040-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.219
+ 100.64.90.219
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661712413
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8eae040-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c8ecf1a0-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c8ecf1a0-0725-11ee-9ff8-05edc9624e6c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31fc2aa64a456f7809c6a7e8dd618e483964fdfa
--- /dev/null
+++ b/graph/incidents_graphml/c/c8ecf1a0-0725-11ee-9ff8-05edc9624e6c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.207
+ 100.64.72.207
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.216
+ HOST-13084
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686356936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8ecf1a0-0725-11ee-9ff8-05edc9624e6c
+
+
+
diff --git a/graph/incidents_graphml/c/c8eef760-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/c8eef760-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6abf5d8f3d4ae3c42b6255222c07e529d5e41c83
--- /dev/null
+++ b/graph/incidents_graphml/c/c8eef760-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.139
+ 100.64.60.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685320131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8eef760-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/c8ef4f50-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/c/c8ef4f50-65c6-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bb9d0f599dddb4b6dc817673fc8a27757bf2a7f
--- /dev/null
+++ b/graph/incidents_graphml/c/c8ef4f50-65c6-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.154
+ 100.64.81.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.158
+ 100.64.72.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668613996
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ef4f50-65c6-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668613996
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c8ef4f50-65c6-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/c/c8f0aca0-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8f0aca0-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f81f43c7e58fcb4a2c0ab5797b17f586b041f729
--- /dev/null
+++ b/graph/incidents_graphml/c/c8f0aca0-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.219
+ 100.64.90.219
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661712413
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8f0aca0-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c8f1a600-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c8f1a600-5789-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d2ec31b06a3bdae3dcdc334194764d0c38576d0
--- /dev/null
+++ b/graph/incidents_graphml/c/c8f1a600-5789-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.174
+ 100.64.49.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695195978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c8f1a600-5789-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/c/c8f346f0-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/c/c8f346f0-131d-11ee-8854-7b8acd154f2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdb8e96d8baba24f6d2743dc85c15c16ced9edd3
--- /dev/null
+++ b/graph/incidents_graphml/c/c8f346f0-131d-11ee-8854-7b8acd154f2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.36
+ 100.64.53.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687672914
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8f346f0-131d-11ee-8854-7b8acd154f2f
+
+
+
diff --git a/graph/incidents_graphml/c/c8f51970-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8f51970-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82304a1a44fbe7465a4bb2531584c146c0558ce5
--- /dev/null
+++ b/graph/incidents_graphml/c/c8f51970-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.195
+ 100.64.82.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661712413
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c8f51970-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c8f71b00-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c8f71b00-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52380e1bac758e8b3d232a8e9d57de6d062e9f31
--- /dev/null
+++ b/graph/incidents_graphml/c/c8f71b00-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692353999
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8f71b00-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/c8fc4560-2701-11ed-bc1f-0928ad8774f3.graphml b/graph/incidents_graphml/c/c8fc4560-2701-11ed-bc1f-0928ad8774f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1683053a39c0f4d0f9fd975834711847be5131e5
--- /dev/null
+++ b/graph/incidents_graphml/c/c8fc4560-2701-11ed-bc1f-0928ad8774f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.82.195
+ 100.64.82.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661712413
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c8fc4560-2701-11ed-bc1f-0928ad8774f3
+
+
+
diff --git a/graph/incidents_graphml/c/c900c130-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c900c130-5789-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbef7f1937608ee16c05872fdd6a829d02552679
--- /dev/null
+++ b/graph/incidents_graphml/c/c900c130-5789-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.174
+ 100.64.49.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695195979
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c900c130-5789-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/c/c902a670-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/c902a670-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9908bc0406405198f5a70d89cb6d030e3616056b
--- /dev/null
+++ b/graph/incidents_graphml/c/c902a670-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.60.139
+ 100.64.60.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685320131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c902a670-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/c9035fd0-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/c9035fd0-0725-11ee-9ff8-05edc9624e6c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7996ef307b1efebce4c7e5304df799dd2c9e18ec
--- /dev/null
+++ b/graph/incidents_graphml/c/c9035fd0-0725-11ee-9ff8-05edc9624e6c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.216
+ HOST-13084
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.207
+ 100.64.72.207
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686356936
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9035fd0-0725-11ee-9ff8-05edc9624e6c
+
+
+
diff --git a/graph/incidents_graphml/c/c903f790-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c903f790-4ceb-11ee-b223-133fe64c82b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7d74be1c14ae967e1633ba414cc743a040fb76d
--- /dev/null
+++ b/graph/incidents_graphml/c/c903f790-4ceb-11ee-b223-133fe64c82b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.81
+ 100.64.28.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694028606
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c903f790-4ceb-11ee-b223-133fe64c82b5
+
+
+
diff --git a/graph/incidents_graphml/c/c90b3f40-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c90b3f40-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d468995567ae485f2cd99b6fbf4b19f8738b8dd
--- /dev/null
+++ b/graph/incidents_graphml/c/c90b3f40-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692353999
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c90b3f40-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/c914a600-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c914a600-3d6c-11ee-b209-c721199fad49.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7fee89495a8354b10c96d8debadc8a603235ceb
--- /dev/null
+++ b/graph/incidents_graphml/c/c914a600-3d6c-11ee-b209-c721199fad49.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.195
+ 100.64.12.195
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692324793
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c914a600-3d6c-11ee-b209-c721199fad49
+
+
+
diff --git a/graph/incidents_graphml/c/c91cecc0-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c91cecc0-a113-11ed-b936-1349c6e38dc6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5a0bcbf2c850f50f8c7b5567fc456c7fed10019
--- /dev/null
+++ b/graph/incidents_graphml/c/c91cecc0-a113-11ed-b936-1349c6e38dc6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.130
+ 100.64.9.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675134186
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c91cecc0-a113-11ed-b936-1349c6e38dc6
+
+
+
diff --git a/graph/incidents_graphml/c/c9230740-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c9230740-a113-11ed-b936-1349c6e38dc6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14c4477d042f8fcf9cfca273be541d9a659a7a7d
--- /dev/null
+++ b/graph/incidents_graphml/c/c9230740-a113-11ed-b936-1349c6e38dc6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.130
+ 100.64.9.130
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675134186
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9230740-a113-11ed-b936-1349c6e38dc6
+
+
+
diff --git a/graph/incidents_graphml/c/c925c0d0-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c925c0d0-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33d914fc91f6409a60dcece0a975f77a74781bb7
--- /dev/null
+++ b/graph/incidents_graphml/c/c925c0d0-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.8
+ 100.64.30.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826875
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c925c0d0-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c925f3c0-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c925f3c0-73d5-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9562125d8924d0c0eb46c3f76694da5b20d5d17
--- /dev/null
+++ b/graph/incidents_graphml/c/c925f3c0-73d5-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.22
+ 100.64.67.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698307253
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c925f3c0-73d5-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/c/c926dd90-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c926dd90-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff601f0d47f5102783092011c4b394796368a4e2
--- /dev/null
+++ b/graph/incidents_graphml/c/c926dd90-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.97
+ 100.64.10.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692353999
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c926dd90-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/c92725f0-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/c/c92725f0-a113-11ed-b936-1349c6e38dc6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0fc47600c9224aa4dcff74b82786c86dcb866a4
--- /dev/null
+++ b/graph/incidents_graphml/c/c92725f0-a113-11ed-b936-1349c6e38dc6.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.143
+ 100.64.86.143
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675134186
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c92725f0-a113-11ed-b936-1349c6e38dc6
+
+
+ INCIDENT_LINK
+ 1675134186
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c92725f0-a113-11ed-b936-1349c6e38dc6
+
+
+
diff --git a/graph/incidents_graphml/c/c9289a40-276b-11ef-b363-fdc4064c84e0.graphml b/graph/incidents_graphml/c/c9289a40-276b-11ef-b363-fdc4064c84e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5a86ad23e712cf7d640fc9ed3e7ccca845cac79
--- /dev/null
+++ b/graph/incidents_graphml/c/c9289a40-276b-11ef-b363-fdc4064c84e0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.80
+ 100.64.92.80
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718052936
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9289a40-276b-11ef-b363-fdc4064c84e0
+
+
+
diff --git a/graph/incidents_graphml/c/c93d63b0-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c93d63b0-3d6c-11ee-b209-c721199fad49.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..288ec03bbf895578c718b1aced079502164ec0c8
--- /dev/null
+++ b/graph/incidents_graphml/c/c93d63b0-3d6c-11ee-b209-c721199fad49.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.197
+ 100.64.12.197
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692324793
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c93d63b0-3d6c-11ee-b209-c721199fad49
+
+
+
diff --git a/graph/incidents_graphml/c/c93ed260-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c93ed260-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f245f4ad544bb2407eb5da077048c018359a774
--- /dev/null
+++ b/graph/incidents_graphml/c/c93ed260-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.97
+ 100.64.10.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692353999
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c93ed260-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/c9405e50-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/c9405e50-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10972ae4b0e286a83c272d8f7630a817cf85054a
--- /dev/null
+++ b/graph/incidents_graphml/c/c9405e50-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.43
+ 100.64.36.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695936002
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9405e50-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/c94e9190-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/c94e9190-33da-11ed-bcaf-e3fcd610a254.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f54dcbbad7f20685f068dc3c0d07e4fcba81a303
--- /dev/null
+++ b/graph/incidents_graphml/c/c94e9190-33da-11ed-bcaf-e3fcd610a254.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.93
+ 100.64.82.93
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.181
+ 100.64.71.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.116
+ 100.64.71.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663125029
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c94e9190-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125029
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c94e9190-33da-11ed-bcaf-e3fcd610a254
+
+
+
diff --git a/graph/incidents_graphml/c/c95d2fd0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c95d2fd0-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8cfb272ec07561130beb14ed89959f2e92df14ed
--- /dev/null
+++ b/graph/incidents_graphml/c/c95d2fd0-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.232
+ 100.64.9.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692353999
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c95d2fd0-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/c95f91b0-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c95f91b0-3d6c-11ee-b209-c721199fad49.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f3af3be157a2550f6dfb16e3c91e951e0a3a8a5
--- /dev/null
+++ b/graph/incidents_graphml/c/c95f91b0-3d6c-11ee-b209-c721199fad49.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.197
+ 100.64.12.197
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c95f91b0-3d6c-11ee-b209-c721199fad49
+
+
+
diff --git a/graph/incidents_graphml/c/c964b690-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/c/c964b690-017b-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa7f5a0750062bb148118541ef6d2b7f3b9285ad
--- /dev/null
+++ b/graph/incidents_graphml/c/c964b690-017b-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.79.214
+ 100.64.79.214
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685734166
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c964b690-017b-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/c/c96590e0-082a-11ef-9432-0316676438e6.graphml b/graph/incidents_graphml/c/c96590e0-082a-11ef-9432-0316676438e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0137c891c8c026c432602d4f1536e4ce1f2dc839
--- /dev/null
+++ b/graph/incidents_graphml/c/c96590e0-082a-11ef-9432-0316676438e6.graphml
@@ -0,0 +1,753 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.180
+ 100.64.34.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.56
+ 100.64.64.56
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.164
+ 100.64.97.164
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.172
+ 100.64.19.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.67.11
+ 100.64.67.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.26.109
+ 100.64.26.109
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.129
+ USER-0015-2172.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.45.28
+ 100.64.45.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.83
+ 100.64.10.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.103
+ 100.64.23.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.10.210
+ 100.64.10.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.165
+ 100.64.97.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.47.89
+ USER-0015-2173.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.83
+ 100.64.17.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.166
+ 100.64.97.166
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616533
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c96590e0-082a-11ef-9432-0316676438e6
+
+
+
diff --git a/graph/incidents_graphml/c/c97ffa20-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/c97ffa20-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..018b4c1149cc8b8e16d90d43bdd93505a3b219db
--- /dev/null
+++ b/graph/incidents_graphml/c/c97ffa20-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.101
+ 100.64.32.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c97ffa20-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/c981f5e0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c981f5e0-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aed2cc626b1f758687d377ffdbf56df45d955685
--- /dev/null
+++ b/graph/incidents_graphml/c/c981f5e0-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.232
+ 100.64.9.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692354000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c981f5e0-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/c987e580-2cea-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/c/c987e580-2cea-11ee-b828-99998b56933c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..732188c815f43232440adf70b9d5b61f802d3741
--- /dev/null
+++ b/graph/incidents_graphml/c/c987e580-2cea-11ee-b828-99998b56933c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.20.73
+ 100.64.20.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690509741
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c987e580-2cea-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690509741
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c987e580-2cea-11ee-b828-99998b56933c
+
+
+
diff --git a/graph/incidents_graphml/c/c98e2af0-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/c98e2af0-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2961d396cec9cd40e707c530246505042b87737d
--- /dev/null
+++ b/graph/incidents_graphml/c/c98e2af0-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.101
+ 100.64.32.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370092
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c98e2af0-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/c9957060-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/c/c9957060-138b-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed16b3e8abfc040649c6350e65dcc4d0fcba364a
--- /dev/null
+++ b/graph/incidents_graphml/c/c9957060-138b-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.150
+ 100.64.9.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.81
+ 100.64.74.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687720160
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9957060-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720160
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9957060-138b-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/c/c9982940-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/c9982940-8c0d-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fc7b24f32185b3ab5f0dc02137ab6d42a651854
--- /dev/null
+++ b/graph/incidents_graphml/c/c9982940-8c0d-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.216
+ 100.64.16.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700970134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9982940-8c0d-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/c/c99b1600-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/c99b1600-170a-11ee-9198-135231c2dce9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86c7d8e26fb626bca1ed4725ebce4c7ca5f079a5
--- /dev/null
+++ b/graph/incidents_graphml/c/c99b1600-170a-11ee-9198-135231c2dce9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.161
+ 100.64.33.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688104559
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c99b1600-170a-11ee-9198-135231c2dce9
+
+
+
diff --git a/graph/incidents_graphml/c/c9a502d0-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c9a502d0-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..032398e21fa32a993245998ee22a7271792fe509
--- /dev/null
+++ b/graph/incidents_graphml/c/c9a502d0-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.34
+ 100.64.14.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363947
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9a502d0-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c9a56d40-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/c9a56d40-0da9-11ee-812a-a702327978d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88f3517c9f150b7e1c4f764a51a242fb86c03db7
--- /dev/null
+++ b/graph/incidents_graphml/c/c9a56d40-0da9-11ee-812a-a702327978d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.144
+ 100.64.25.144
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687073338
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9a56d40-0da9-11ee-812a-a702327978d7
+
+
+
diff --git a/graph/incidents_graphml/c/c9a71820-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c9a71820-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78ab8e4c1b7ef648b8e0dffd734cf265c23e30dd
--- /dev/null
+++ b/graph/incidents_graphml/c/c9a71820-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.30
+ 100.64.6.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.58
+ 100.64.1.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.50.74
+ USER-0015-1771.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660528292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9a71820-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9a71820-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9a71820-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9a71820-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/c/c9aa4c10-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/c/c9aa4c10-60a7-11ee-a238-43fa5b505c3f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a776d2d3e7ae1e53c28320d74ef2bff82041a82
--- /dev/null
+++ b/graph/incidents_graphml/c/c9aa4c10-60a7-11ee-a238-43fa5b505c3f.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.70
+ 100.64.94.70
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.167
+ 100.64.37.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.71
+ 100.64.94.71
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.6
+ 100.64.40.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.72
+ 100.64.94.72
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198425
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9aa4c10-60a7-11ee-a238-43fa5b505c3f
+
+
+
diff --git a/graph/incidents_graphml/c/c9ac1ae0-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/c9ac1ae0-33da-11ed-bcaf-e3fcd610a254.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..605025445dee984c6f7620c86eaefa4d12c0f609
--- /dev/null
+++ b/graph/incidents_graphml/c/c9ac1ae0-33da-11ed-bcaf-e3fcd610a254.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.94
+ 100.64.82.94
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1663125029
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c9ac1ae0-33da-11ed-bcaf-e3fcd610a254
+
+
+
diff --git a/graph/incidents_graphml/c/c9b15cd0-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/c/c9b15cd0-138b-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..363bf89d7906f8c93e9d4c96a80454e1f8230f3f
--- /dev/null
+++ b/graph/incidents_graphml/c/c9b15cd0-138b-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.82
+ 100.64.74.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.166
+ 100.64.1.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.83
+ 100.64.10.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687720160
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9b15cd0-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720160
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9b15cd0-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720160
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9b15cd0-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720160
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9b15cd0-138b-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/c/c9b640e0-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c9b640e0-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4703e7fed0cff6cc3b47bb8e754e50cfa8a2c08f
--- /dev/null
+++ b/graph/incidents_graphml/c/c9b640e0-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.34
+ 100.64.14.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363948
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9b640e0-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c9c0b1e0-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/c9c0b1e0-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd08bc2dd0c04afe072136ea1b3902d16ec73477
--- /dev/null
+++ b/graph/incidents_graphml/c/c9c0b1e0-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.79
+ 100.64.27.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695936003
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9c0b1e0-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/c9c17b70-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c9c17b70-a166-11ed-863f-a161c6cf34a1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d092c65814d229c9b3b8423e7ec37800b405ae5a
--- /dev/null
+++ b/graph/incidents_graphml/c/c9c17b70-a166-11ed-863f-a161c6cf34a1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.217
+ 100.64.86.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675169836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9c17b70-a166-11ed-863f-a161c6cf34a1
+
+
+
diff --git a/graph/incidents_graphml/c/c9c2cf70-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c9c2cf70-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8b7f55dcafc9c80379a8eb37b3337c9ffdf5b53
--- /dev/null
+++ b/graph/incidents_graphml/c/c9c2cf70-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.99
+ 100.64.10.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692354000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9c2cf70-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/c9c4fde0-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c9c4fde0-a166-11ed-863f-a161c6cf34a1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9c3eebcf04591e0ee8e8f22cb859722dfd55ed1
--- /dev/null
+++ b/graph/incidents_graphml/c/c9c4fde0-a166-11ed-863f-a161c6cf34a1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.217
+ 100.64.86.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1675169836
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9c4fde0-a166-11ed-863f-a161c6cf34a1
+
+
+
diff --git a/graph/incidents_graphml/c/c9c50330-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/c9c50330-0da9-11ee-812a-a702327978d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd3071a3b38521d96753bb82b23f7ff33f71284e
--- /dev/null
+++ b/graph/incidents_graphml/c/c9c50330-0da9-11ee-812a-a702327978d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.144
+ 100.64.25.144
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687073338
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9c50330-0da9-11ee-812a-a702327978d7
+
+
+
diff --git a/graph/incidents_graphml/c/c9c66ba0-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/c9c66ba0-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..124f96fdb7d571ca26ddf08c656b3f59efcc781d
--- /dev/null
+++ b/graph/incidents_graphml/c/c9c66ba0-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.25
+ 100.64.17.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685320132
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9c66ba0-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/c9c720c0-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c9c720c0-a166-11ed-863f-a161c6cf34a1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1cbb4429a78a4ac62130bf3d89e8704084a9844
--- /dev/null
+++ b/graph/incidents_graphml/c/c9c720c0-a166-11ed-863f-a161c6cf34a1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.219
+ 100.64.86.219
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1675169836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9c720c0-a166-11ed-863f-a161c6cf34a1
+
+
+
diff --git a/graph/incidents_graphml/c/c9ca7c20-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/c9ca7c20-a166-11ed-863f-a161c6cf34a1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5034a0b9523087541df8002af7be1552fdb7ea1
--- /dev/null
+++ b/graph/incidents_graphml/c/c9ca7c20-a166-11ed-863f-a161c6cf34a1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.219
+ 100.64.86.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675169836
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9ca7c20-a166-11ed-863f-a161c6cf34a1
+
+
+
diff --git a/graph/incidents_graphml/c/c9ccfb70-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/c9ccfb70-170a-11ee-9198-135231c2dce9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28903906cf090be09c6c2961bbea6e9609b6d538
--- /dev/null
+++ b/graph/incidents_graphml/c/c9ccfb70-170a-11ee-9198-135231c2dce9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.43
+ 100.64.11.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688104559
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ccfb70-170a-11ee-9198-135231c2dce9
+
+
+
diff --git a/graph/incidents_graphml/c/c9cd5410-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/c9cd5410-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..159a36c093ade06563092c2993418480480a37f2
--- /dev/null
+++ b/graph/incidents_graphml/c/c9cd5410-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.186
+ 100.64.40.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852847
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9cd5410-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/c9cebe20-0995-11ed-84f1-6d22bc1fbcb2.graphml b/graph/incidents_graphml/c/c9cebe20-0995-11ed-84f1-6d22bc1fbcb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..098ccca0fdda7bfd71f3ae57980d32a8191c5b45
--- /dev/null
+++ b/graph/incidents_graphml/c/c9cebe20-0995-11ed-84f1-6d22bc1fbcb2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.42
+ 100.64.71.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1658477445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9cebe20-0995-11ed-84f1-6d22bc1fbcb2
+
+
+
diff --git a/graph/incidents_graphml/c/c9cff420-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/c9cff420-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e8fe5fa38357d7f6288ab59086f5fd06877aed1
--- /dev/null
+++ b/graph/incidents_graphml/c/c9cff420-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.79
+ 100.64.27.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695936003
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9cff420-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/c9d4e490-3fe4-11ee-9108-95499536c7df.graphml b/graph/incidents_graphml/c/c9d4e490-3fe4-11ee-9108-95499536c7df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6356c377dd963fa4fa8a46f1b4f291a2b455801
--- /dev/null
+++ b/graph/incidents_graphml/c/c9d4e490-3fe4-11ee-9108-95499536c7df.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.2
+ 100.64.18.2
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692596236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9d4e490-3fe4-11ee-9108-95499536c7df
+
+
+
diff --git a/graph/incidents_graphml/c/c9d81d10-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/c9d81d10-3d6c-11ee-b209-c721199fad49.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..903d1c8cff61295fd2bdd42fe39e8cd0921af72a
--- /dev/null
+++ b/graph/incidents_graphml/c/c9d81d10-3d6c-11ee-b209-c721199fad49.graphml
@@ -0,0 +1,323 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.99
+ 100.64.10.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.199
+ 100.64.12.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.200
+ 100.64.12.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.163
+ 100.64.9.163
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.201
+ 100.64.12.201
+ ["Exploiting Host"]
+ 0.83125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.202
+ 100.64.12.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.203
+ 100.64.12.203
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+ INCIDENT_LINK
+ 1692324794
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9d81d10-3d6c-11ee-b209-c721199fad49
+
+
+
diff --git a/graph/incidents_graphml/c/c9dc71f0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c9dc71f0-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86beebff004c387ff23bdeab956d10ae149c6df5
--- /dev/null
+++ b/graph/incidents_graphml/c/c9dc71f0-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.99
+ 100.64.10.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692354000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9dc71f0-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/c9ddd050-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/c/c9ddd050-056f-11ee-bce7-dffdb32a6ba9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aef0fee25369c1f3734955ed9f4c885a11ffa805
--- /dev/null
+++ b/graph/incidents_graphml/c/c9ddd050-056f-11ee-bce7-dffdb32a6ba9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686168818
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9ddd050-056f-11ee-bce7-dffdb32a6ba9
+
+
+ INCIDENT_LINK
+ 1686168818
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9ddd050-056f-11ee-bce7-dffdb32a6ba9
+
+
+
diff --git a/graph/incidents_graphml/c/c9e1e2e0-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/c9e1e2e0-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae9cd675dbd1322598956e1ecb5c8f24648c3cad
--- /dev/null
+++ b/graph/incidents_graphml/c/c9e1e2e0-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.17.25
+ 100.64.17.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685320132
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9e1e2e0-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/c9e7c5d0-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c9e7c5d0-5789-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fc77d88401a523df1b269450b405e933d80eee2
--- /dev/null
+++ b/graph/incidents_graphml/c/c9e7c5d0-5789-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.115
+ 100.64.19.115
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695195980
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9e7c5d0-5789-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/c/c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/c/c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1de4b144957493dd89d4ece5927455fafea53f4
--- /dev/null
+++ b/graph/incidents_graphml/c/c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b.graphml
@@ -0,0 +1,531 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.120
+ 100.64.17.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.121
+ 100.64.17.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.122
+ USER-0015-1214.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.123
+ 100.64.17.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.124
+ 100.64.17.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.125
+ 100.64.17.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.17.126
+ 100.64.17.126
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.127
+ 100.64.17.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.128
+ 100.64.17.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.129
+ 100.64.17.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.157
+ 100.64.9.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.130
+ 100.64.17.130
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030271
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9ee6c30-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+
diff --git a/graph/incidents_graphml/c/c9efb060-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/c/c9efb060-6503-11ee-b447-a9f06618d419.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e9999a4fc6c6e8abe40ca2b306e3b616cf5d25b
--- /dev/null
+++ b/graph/incidents_graphml/c/c9efb060-6503-11ee-b447-a9f06618d419.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.148.220
+ 192.168.148.220
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.1
+ USER-0015-2034.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.1
+ 100.64.90.1
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696677744
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9efb060-6503-11ee-b447-a9f06618d419
+
+
+ INCIDENT_LINK
+ 1696677744
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9efb060-6503-11ee-b447-a9f06618d419
+
+
+ INCIDENT_LINK
+ 1696677744
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9efb060-6503-11ee-b447-a9f06618d419
+
+
+ INCIDENT_LINK
+ 1696677744
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9efb060-6503-11ee-b447-a9f06618d419
+
+
+
diff --git a/graph/incidents_graphml/c/c9f4e0e0-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/c9f4e0e0-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4c1339c6e1890c75eeec4bcc1e6c56748f63d8e
--- /dev/null
+++ b/graph/incidents_graphml/c/c9f4e0e0-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.184
+ 100.64.17.184
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.12
+ 100.64.77.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370466
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9f4e0e0-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370466
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9f4e0e0-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/c/c9f53560-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c9f53560-4ceb-11ee-b223-133fe64c82b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0ff87ef17e61541494b940a9de9f2234ad39c16
--- /dev/null
+++ b/graph/incidents_graphml/c/c9f53560-4ceb-11ee-b223-133fe64c82b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694028608
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c9f53560-4ceb-11ee-b223-133fe64c82b5
+
+
+
diff --git a/graph/incidents_graphml/c/c9f8c660-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/c9f8c660-170a-11ee-9198-135231c2dce9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..788903aca9e78574e3d842640840d93d97d02da1
--- /dev/null
+++ b/graph/incidents_graphml/c/c9f8c660-170a-11ee-9198-135231c2dce9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.43
+ 100.64.11.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688104560
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c9f8c660-170a-11ee-9198-135231c2dce9
+
+
+
diff --git a/graph/incidents_graphml/c/c9f92af0-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/c9f92af0-5789-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0360eab5f46b896346725e641acbdb1293f3673e
--- /dev/null
+++ b/graph/incidents_graphml/c/c9f92af0-5789-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.115
+ 100.64.19.115
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695195980
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c9f92af0-5789-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/c/c9fe2ac0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/c9fe2ac0-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06fb97d5198a31e6521512970fe10e3ac1ce072f
--- /dev/null
+++ b/graph/incidents_graphml/c/c9fe2ac0-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692354000
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c9fe2ac0-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/ca00ca20-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/ca00ca20-2607-11ee-ad88-fb76ca0617eb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef2b4994c76b248ee1c57e0885766be1e161db5a
--- /dev/null
+++ b/graph/incidents_graphml/c/ca00ca20-2607-11ee-ad88-fb76ca0617eb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.31
+ 100.64.15.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689752539
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca00ca20-2607-11ee-ad88-fb76ca0617eb
+
+
+
diff --git a/graph/incidents_graphml/c/ca00f1b0-0995-11ed-84f1-6d22bc1fbcb2.graphml b/graph/incidents_graphml/c/ca00f1b0-0995-11ed-84f1-6d22bc1fbcb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8bdab02a98a3c55015e495e7d77a730282fb85d
--- /dev/null
+++ b/graph/incidents_graphml/c/ca00f1b0-0995-11ed-84f1-6d22bc1fbcb2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.50
+ 100.64.71.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1658477446
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca00f1b0-0995-11ed-84f1-6d22bc1fbcb2
+
+
+
diff --git a/graph/incidents_graphml/c/ca04c5c0-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/ca04c5c0-4ceb-11ee-b223-133fe64c82b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39f1273bce04db9d9459f2f63b82a08d65364448
--- /dev/null
+++ b/graph/incidents_graphml/c/ca04c5c0-4ceb-11ee-b223-133fe64c82b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694028608
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca04c5c0-4ceb-11ee-b223-133fe64c82b5
+
+
+
diff --git a/graph/incidents_graphml/c/ca067160-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/ca067160-5789-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..994f8be25bd91516070870bc85b83ce983b1b50b
--- /dev/null
+++ b/graph/incidents_graphml/c/ca067160-5789-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.224
+ 100.64.32.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695195980
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca067160-5789-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/c/ca086bb0-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/ca086bb0-33da-11ed-bcaf-e3fcd610a254.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0cd2887c167ecc320fe35623b82ffa3f208d536
--- /dev/null
+++ b/graph/incidents_graphml/c/ca086bb0-33da-11ed-bcaf-e3fcd610a254.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.95
+ 100.64.82.95
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.255
+ 100.64.73.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.96
+ 100.64.82.96
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.220
+ 100.64.79.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663125030
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca086bb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125030
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca086bb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125030
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca086bb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125030
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca086bb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125030
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca086bb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125030
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca086bb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125030
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca086bb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125030
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca086bb0-33da-11ed-bcaf-e3fcd610a254
+
+
+
diff --git a/graph/incidents_graphml/c/ca145410-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/ca145410-5789-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01b66b3ad61edb361a85f4a7b0df5c93f5355a2d
--- /dev/null
+++ b/graph/incidents_graphml/c/ca145410-5789-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.224
+ 100.64.32.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695195980
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca145410-5789-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/c/ca153a20-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/ca153a20-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d3e9ee510562d51cd81510426be5701a77da195
--- /dev/null
+++ b/graph/incidents_graphml/c/ca153a20-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.33
+ 100.64.75.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.49
+ USER-0015-1822.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370467
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca153a20-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370467
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca153a20-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/c/ca1ed770-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/ca1ed770-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6bb5d4bff1d24f594dfc9615ff926d88d940c6e
--- /dev/null
+++ b/graph/incidents_graphml/c/ca1ed770-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.183
+ 100.64.6.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695936003
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca1ed770-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/ca217180-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/ca217180-2607-11ee-ad88-fb76ca0617eb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..194628056adcd597e4566965513f743ad561ee1d
--- /dev/null
+++ b/graph/incidents_graphml/c/ca217180-2607-11ee-ad88-fb76ca0617eb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.31
+ 100.64.15.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689752539
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca217180-2607-11ee-ad88-fb76ca0617eb
+
+
+
diff --git a/graph/incidents_graphml/c/ca240b80-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/ca240b80-5789-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf8435e3f6ad114004bf0bee9f72398b34cf5655
--- /dev/null
+++ b/graph/incidents_graphml/c/ca240b80-5789-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.185
+ 100.64.12.185
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695195980
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca240b80-5789-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/c/ca2d2a10-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/ca2d2a10-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bccf849de0e64b68b83cce13b4c31d55bbbdc860
--- /dev/null
+++ b/graph/incidents_graphml/c/ca2d2a10-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.185
+ 100.64.18.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca2d2a10-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/ca2d5f30-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/ca2d5f30-285f-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0ab5a2dd8b20719f2a16572f86f98a91ce22dc2
--- /dev/null
+++ b/graph/incidents_graphml/c/ca2d5f30-285f-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718157735
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca2d5f30-285f-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/c/ca2e67d0-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/ca2e67d0-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcb1172b30ccb70be3b8e171a9fa6c88a76daa4e
--- /dev/null
+++ b/graph/incidents_graphml/c/ca2e67d0-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.183
+ 100.64.6.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695936003
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ca2e67d0-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/ca3326b0-5789-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/c/ca3326b0-5789-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c7be9a855e6757dd04340c83c8158c510ea2606
--- /dev/null
+++ b/graph/incidents_graphml/c/ca3326b0-5789-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.54
+ 100.64.57.54
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695195981
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca3326b0-5789-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/c/ca3ae5b0-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/ca3ae5b0-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddf393d2dcd31e70e755044e5ccf353febc268da
--- /dev/null
+++ b/graph/incidents_graphml/c/ca3ae5b0-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.185
+ 100.64.18.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370093
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ca3ae5b0-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/ca3b41e0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/ca3b41e0-285f-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c016632ce6a089042d003372b3943375e790679f
--- /dev/null
+++ b/graph/incidents_graphml/c/ca3b41e0-285f-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718157735
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ca3b41e0-285f-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/c/ca403cd0-3db0-11ee-8145-f76e3165b5cc.graphml b/graph/incidents_graphml/c/ca403cd0-3db0-11ee-8145-f76e3165b5cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ebe52183ad1b25de94f0f1f4f3087e0e99372ca
--- /dev/null
+++ b/graph/incidents_graphml/c/ca403cd0-3db0-11ee-8145-f76e3165b5cc.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.103
+ 100.64.10.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692354001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca403cd0-3db0-11ee-8145-f76e3165b5cc
+
+
+ INCIDENT_LINK
+ 1692354001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca403cd0-3db0-11ee-8145-f76e3165b5cc
+
+
+
diff --git a/graph/incidents_graphml/c/ca450c00-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca450c00-71eb-11ee-807d-75267aac45c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a130f692937530f44a66f4a14c9fb7d7599d730c
--- /dev/null
+++ b/graph/incidents_graphml/c/ca450c00-71eb-11ee-807d-75267aac45c9.graphml
@@ -0,0 +1,209 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.75
+ 100.64.8.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.68
+ 100.64.43.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.69
+ 100.64.43.69
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.70
+ 100.64.43.70
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca450c00-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca450c00-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca450c00-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca450c00-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca450c00-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca450c00-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca450c00-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca450c00-71eb-11ee-807d-75267aac45c9
+
+
+
diff --git a/graph/incidents_graphml/c/ca51d050-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/ca51d050-2607-11ee-ad88-fb76ca0617eb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d97f71838ded89291e637308b87fe2107bb9ad3
--- /dev/null
+++ b/graph/incidents_graphml/c/ca51d050-2607-11ee-ad88-fb76ca0617eb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.102
+ 100.64.15.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689752539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ca51d050-2607-11ee-ad88-fb76ca0617eb
+
+
+
diff --git a/graph/incidents_graphml/c/ca5586c0-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca5586c0-71eb-11ee-807d-75267aac45c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de48ce31ebfc6ff3ef9f77e9bdc705997923a8ad
--- /dev/null
+++ b/graph/incidents_graphml/c/ca5586c0-71eb-11ee-807d-75267aac45c9.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca5586c0-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca5586c0-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca5586c0-71eb-11ee-807d-75267aac45c9
+
+
+
diff --git a/graph/incidents_graphml/c/ca62f440-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca62f440-71eb-11ee-807d-75267aac45c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..635231229de3e58605d30e6d5723111ff891bb26
--- /dev/null
+++ b/graph/incidents_graphml/c/ca62f440-71eb-11ee-807d-75267aac45c9.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.171
+ 100.64.14.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca62f440-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ca62f440-71eb-11ee-807d-75267aac45c9
+
+
+
diff --git a/graph/incidents_graphml/c/ca65e7a0-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/c/ca65e7a0-efc3-11ec-9799-0176ac54cf1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55b2d22d58a2bf51fbbc6e61694f203bf3539135
--- /dev/null
+++ b/graph/incidents_graphml/c/ca65e7a0-efc3-11ec-9799-0176ac54cf1b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.161
+ 100.64.80.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.90
+ USER-0015-1841.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655638473
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca65e7a0-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638473
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca65e7a0-efc3-11ec-9799-0176ac54cf1b
+
+
+
diff --git a/graph/incidents_graphml/c/ca6773f0-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/ca6773f0-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c7580bb5de949df37f9f63ca45f60e04b21b377
--- /dev/null
+++ b/graph/incidents_graphml/c/ca6773f0-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.192
+ 100.64.38.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169546
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca6773f0-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/ca7ddd90-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/ca7ddd90-ee30-11ec-9c18-c95a461c6308.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bc7dbd004e99d56a8c6eb9dd5a46597c29ef505
--- /dev/null
+++ b/graph/incidents_graphml/c/ca7ddd90-ee30-11ec-9c18-c95a461c6308.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.214.204
+ USER-0015-1832.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 10.148.128.32
+ 10.148.128.32
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655465386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca7ddd90-ee30-11ec-9c18-c95a461c6308
+
+
+ INCIDENT_LINK
+ 1655465386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca7ddd90-ee30-11ec-9c18-c95a461c6308
+
+
+
diff --git a/graph/incidents_graphml/c/ca7e4470-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca7e4470-71eb-11ee-807d-75267aac45c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a8be62ad4bde0b61ea12ac3f45961635c89816e
--- /dev/null
+++ b/graph/incidents_graphml/c/ca7e4470-71eb-11ee-807d-75267aac45c9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.192
+ 100.64.40.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca7e4470-71eb-11ee-807d-75267aac45c9
+
+
+
diff --git a/graph/incidents_graphml/c/ca81b5b0-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/ca81b5b0-182c-11ee-b591-f5bec484f8bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63de9b505a9eb6b49a096a0ca409f3b9a8d2e995
--- /dev/null
+++ b/graph/incidents_graphml/c/ca81b5b0-182c-11ee-b591-f5bec484f8bc.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.1
+ 100.64.34.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.128
+ 100.64.71.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.86
+ 100.64.73.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.4.163
+ 100.64.4.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.87
+ 100.64.73.87
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688229115
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca81b5b0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229115
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca81b5b0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229115
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca81b5b0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229115
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca81b5b0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229115
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca81b5b0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229115
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca81b5b0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229115
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca81b5b0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229115
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca81b5b0-182c-11ee-b591-f5bec484f8bc
+
+
+
diff --git a/graph/incidents_graphml/c/ca82d8a0-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/c/ca82d8a0-427e-11ef-ab73-b9dc9970dec3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46e7eed45e9abce135e5431034bbf7e2bcdb92b5
--- /dev/null
+++ b/graph/incidents_graphml/c/ca82d8a0-427e-11ef-ab73-b9dc9970dec3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.202
+ 100.64.6.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721029780
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca82d8a0-427e-11ef-ab73-b9dc9970dec3
+
+
+
diff --git a/graph/incidents_graphml/c/ca876da0-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/ca876da0-3245-11ef-9bb6-5bd0425d571b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5f8ce39b00a7755ced589cfc48f7405df4e02ac
--- /dev/null
+++ b/graph/incidents_graphml/c/ca876da0-3245-11ef-9bb6-5bd0425d571b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.123
+ 100.64.8.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719246080
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ca876da0-3245-11ef-9bb6-5bd0425d571b
+
+
+
diff --git a/graph/incidents_graphml/c/ca8d1180-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/ca8d1180-71eb-11ee-807d-75267aac45c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7054d877b81b93109b4382337ab4904b38ca82be
--- /dev/null
+++ b/graph/incidents_graphml/c/ca8d1180-71eb-11ee-807d-75267aac45c9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.192
+ 100.64.40.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca8d1180-71eb-11ee-807d-75267aac45c9
+
+
+
diff --git a/graph/incidents_graphml/c/ca8d5a60-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ca8d5a60-3d0b-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19eb74e428ce7b58f39aa231c502f1b05472024d
--- /dev/null
+++ b/graph/incidents_graphml/c/ca8d5a60-3d0b-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283134
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ca8d5a60-3d0b-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/c/ca8faf10-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/ca8faf10-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..590f25441e56883f4901c2c68ad45df1c26d677e
--- /dev/null
+++ b/graph/incidents_graphml/c/ca8faf10-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.105
+ 100.64.39.105
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685320133
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ca8faf10-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/ca9906b0-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/ca9906b0-ee30-11ec-9c18-c95a461c6308.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9fdd5b90496c86dff587d385070f6c859b045c88
--- /dev/null
+++ b/graph/incidents_graphml/c/ca9906b0-ee30-11ec-9c18-c95a461c6308.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.86
+ 100.64.71.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.172
+ USER-0015-1789.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655465386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca9906b0-ee30-11ec-9c18-c95a461c6308
+
+
+ INCIDENT_LINK
+ 1655465386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ca9906b0-ee30-11ec-9c18-c95a461c6308
+
+
+
diff --git a/graph/incidents_graphml/c/ca9d1760-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/c/ca9d1760-427e-11ef-ab73-b9dc9970dec3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7889d066ed182e9a5cf586f3a6e00ca339ef9007
--- /dev/null
+++ b/graph/incidents_graphml/c/ca9d1760-427e-11ef-ab73-b9dc9970dec3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.202
+ 100.64.6.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1721029780
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ca9d1760-427e-11ef-ab73-b9dc9970dec3
+
+
+
diff --git a/graph/incidents_graphml/c/caa4ed90-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/caa4ed90-ee30-11ec-9c18-c95a461c6308.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04f3d25346b80c14d152b3fa37203b651c0d8309
--- /dev/null
+++ b/graph/incidents_graphml/c/caa4ed90-ee30-11ec-9c18-c95a461c6308.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.107
+ 100.64.78.107
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.28
+ USER-0015-1833.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655465386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ caa4ed90-ee30-11ec-9c18-c95a461c6308
+
+
+ INCIDENT_LINK
+ 1655465386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ caa4ed90-ee30-11ec-9c18-c95a461c6308
+
+
+
diff --git a/graph/incidents_graphml/c/caa86730-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/caa86730-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a01065e445d13339b2fcedac8412aa93fff04405
--- /dev/null
+++ b/graph/incidents_graphml/c/caa86730-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.39.105
+ 100.64.39.105
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685320134
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ caa86730-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/cab012f0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cab012f0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..22fe4bdcb0a39274ce4e57b898edae2c6a5397c6
--- /dev/null
+++ b/graph/incidents_graphml/c/cab012f0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.134
+ 100.64.34.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852848
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cab012f0-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/cabf17d0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/cabf17d0-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69c645b9fc40a1216836c0712eb9704d23165ffb
--- /dev/null
+++ b/graph/incidents_graphml/c/cabf17d0-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.56
+ 100.64.76.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.32
+ 100.64.75.32
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660528294
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cabf17d0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528294
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cabf17d0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/c/cabff8b0-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/c/cabff8b0-6503-11ee-b447-a9f06618d419.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a1f2a5c16ecc7201efdb97d6f3a36177fd88c55
--- /dev/null
+++ b/graph/incidents_graphml/c/cabff8b0-6503-11ee-b447-a9f06618d419.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.9
+ USER-0015-2035.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696677745
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cabff8b0-6503-11ee-b447-a9f06618d419
+
+
+
diff --git a/graph/incidents_graphml/c/cac26270-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cac26270-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60eb394f9e4ee99ebec16d901a9e8138a85ff4cc
--- /dev/null
+++ b/graph/incidents_graphml/c/cac26270-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.134
+ 100.64.34.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852848
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cac26270-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/cac3b350-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/cac3b350-3245-11ef-9bb6-5bd0425d571b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..171d71b1443c0fa3e4e8183149a8988752d0a713
--- /dev/null
+++ b/graph/incidents_graphml/c/cac3b350-3245-11ef-9bb6-5bd0425d571b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.200
+ USER-0015-1992.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719246080
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cac3b350-3245-11ef-9bb6-5bd0425d571b
+
+
+
diff --git a/graph/incidents_graphml/c/cac3d8f0-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/cac3d8f0-71eb-11ee-807d-75267aac45c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e39da1d6250abf9187c41d4c7578b502ef1d7ae7
--- /dev/null
+++ b/graph/incidents_graphml/c/cac3d8f0-71eb-11ee-807d-75267aac45c9.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.74
+ 100.64.43.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cac3d8f0-71eb-11ee-807d-75267aac45c9
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cac3d8f0-71eb-11ee-807d-75267aac45c9
+
+
+
diff --git a/graph/incidents_graphml/c/cac75e10-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/c/cac75e10-1b49-11ee-80b5-4fc6a3f1abdb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee69fdc7f744819517deb65d43bcb86dd8ebd5b5
--- /dev/null
+++ b/graph/incidents_graphml/c/cac75e10-1b49-11ee-80b5-4fc6a3f1abdb.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.197
+ 100.64.13.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.198
+ 100.64.13.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.199
+ 100.64.13.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.200
+ 100.64.13.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.201
+ 100.64.13.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.202
+ 100.64.13.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.203
+ 100.64.13.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571424
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cac75e10-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+
diff --git a/graph/incidents_graphml/c/cacbb940-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cacbb940-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13b42058d03060988119057af0acc247fd5d0156
--- /dev/null
+++ b/graph/incidents_graphml/c/cacbb940-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.163
+ 100.64.45.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695936004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cacbb940-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/cacfcff0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cacfcff0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8bc4599290dec055d2f43f98310f165def5e4f0
--- /dev/null
+++ b/graph/incidents_graphml/c/cacfcff0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.41
+ USER-0015-1211.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852848
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cacfcff0-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/cad209c0-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/cad209c0-71eb-11ee-807d-75267aac45c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bd25b7fc39c26014708e6062010c1f2369531d1
--- /dev/null
+++ b/graph/incidents_graphml/c/cad209c0-71eb-11ee-807d-75267aac45c9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.74
+ 100.64.43.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698096802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cad209c0-71eb-11ee-807d-75267aac45c9
+
+
+
diff --git a/graph/incidents_graphml/c/cad518c0-2454-11ee-8059-d3725e6f3965.graphml b/graph/incidents_graphml/c/cad518c0-2454-11ee-8059-d3725e6f3965.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..279db17319894037828d230bf95e915d28c157d7
--- /dev/null
+++ b/graph/incidents_graphml/c/cad518c0-2454-11ee-8059-d3725e6f3965.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.119
+ 100.64.23.119
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689565709
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cad518c0-2454-11ee-8059-d3725e6f3965
+
+
+
diff --git a/graph/incidents_graphml/c/cada8110-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cada8110-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb75e108a946f1c2302a97d64a8a73b3aa9039b0
--- /dev/null
+++ b/graph/incidents_graphml/c/cada8110-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.252
+ 100.64.40.252
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.253
+ 100.64.40.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.96
+ 100.64.25.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370094
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cada8110-6b4f-11ee-a565-4f025efe2b34
+
+
+ INCIDENT_LINK
+ 1697370094
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cada8110-6b4f-11ee-a565-4f025efe2b34
+
+
+ INCIDENT_LINK
+ 1697370094
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cada8110-6b4f-11ee-a565-4f025efe2b34
+
+
+ INCIDENT_LINK
+ 1697370094
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cada8110-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/cadbbed0-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cadbbed0-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c63d900d32d9112227deecff7f86bb2104de5df
--- /dev/null
+++ b/graph/incidents_graphml/c/cadbbed0-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.45.163
+ 100.64.45.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695936005
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cadbbed0-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/cade9d00-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cade9d00-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..526c23da1c0cb0818a8143e47a6e19b1bab6b637
--- /dev/null
+++ b/graph/incidents_graphml/c/cade9d00-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.41
+ USER-0015-1211.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852848
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cade9d00-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/cadf2830-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/cadf2830-8c0d-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a68f609e33fe1150b5890bc858f9e2f676a731e7
--- /dev/null
+++ b/graph/incidents_graphml/c/cadf2830-8c0d-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.216
+ 100.64.16.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700970136
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cadf2830-8c0d-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/c/cae056a0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cae056a0-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5eff02241f415c2c125ba9e0461aaac784d9633a
--- /dev/null
+++ b/graph/incidents_graphml/c/cae056a0-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.115
+ 100.64.29.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659111
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cae056a0-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/caebbc60-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/caebbc60-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6b8d6a7477c1065d6ab850b398a71f27db590ce
--- /dev/null
+++ b/graph/incidents_graphml/c/caebbc60-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.147
+ 100.64.52.147
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852849
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ caebbc60-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/caf01820-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/caf01820-8c0d-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60793332afa602a368358d1aa685deb94c8bada0
--- /dev/null
+++ b/graph/incidents_graphml/c/caf01820-8c0d-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.216
+ 100.64.16.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700970136
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ caf01820-8c0d-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/c/caf25c70-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/c/caf25c70-60a7-11ee-a238-43fa5b505c3f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77601322ffa370dc661de20b564f5ca928d28293
--- /dev/null
+++ b/graph/incidents_graphml/c/caf25c70-60a7-11ee-a238-43fa5b505c3f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.5.80
+ 172.29.5.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.76
+ 100.64.94.76
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696198427
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ caf25c70-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198427
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ caf25c70-60a7-11ee-a238-43fa5b505c3f
+
+
+
diff --git a/graph/incidents_graphml/c/caf9c620-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/caf9c620-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fccaac5261a41038ee96dd79dd38128b008c298f
--- /dev/null
+++ b/graph/incidents_graphml/c/caf9c620-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.147
+ 100.64.52.147
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852849
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ caf9c620-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/cafa1eb0-33da-11ed-bcaf-e3fcd610a254.graphml b/graph/incidents_graphml/c/cafa1eb0-33da-11ed-bcaf-e3fcd610a254.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..665b93c2179957ba32c09b2e939033ff167e633a
--- /dev/null
+++ b/graph/incidents_graphml/c/cafa1eb0-33da-11ed-bcaf-e3fcd610a254.graphml
@@ -0,0 +1,309 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.157
+ 100.64.77.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.25
+ 100.64.1.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.13
+ 100.64.77.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.97
+ 100.64.82.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.40
+ 100.64.73.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.2.11
+ 100.64.2.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.17
+ 100.64.73.17
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.98
+ 100.64.82.98
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.54.139
+ 100.64.54.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+ INCIDENT_LINK
+ 1663125031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cafa1eb0-33da-11ed-bcaf-e3fcd610a254
+
+
+
diff --git a/graph/incidents_graphml/c/cb00b9f0-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/cb00b9f0-8c0d-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81af8909605c22ed88a3c4c409de507caf1241bb
--- /dev/null
+++ b/graph/incidents_graphml/c/cb00b9f0-8c0d-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.218
+ 100.64.16.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700970136
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb00b9f0-8c0d-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/c/cb022f10-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/c/cb022f10-13f4-11ee-9bb8-6b8312f57fd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..799c632b6e842ebdc359264d36f4e4e32a3ca1be
--- /dev/null
+++ b/graph/incidents_graphml/c/cb022f10-13f4-11ee-9bb8-6b8312f57fd1.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.219
+ 100.64.72.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.220
+ 100.64.72.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.221
+ USER-0015-1642.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687765259
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb022f10-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765259
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb022f10-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765259
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb022f10-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765259
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb022f10-13f4-11ee-9bb8-6b8312f57fd1
+
+
+
diff --git a/graph/incidents_graphml/c/cb067050-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cb067050-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d343a7d93bb687c6e78d6cd5bac49fc75ac5d37b
--- /dev/null
+++ b/graph/incidents_graphml/c/cb067050-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.149
+ 100.64.52.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852849
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb067050-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/cb0b8080-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cb0b8080-5092-11ee-9f57-f5fa7d55d535.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51e052580d8f90bce38aab2900c029dc7dc50f69
--- /dev/null
+++ b/graph/incidents_graphml/c/cb0b8080-5092-11ee-9f57-f5fa7d55d535.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694430189
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb0b8080-5092-11ee-9f57-f5fa7d55d535
+
+
+
diff --git a/graph/incidents_graphml/c/cb0e4470-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/cb0e4470-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..279453ac1e60ba49f2492aacec0570b8fc1b6e78
--- /dev/null
+++ b/graph/incidents_graphml/c/cb0e4470-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.94
+ 100.64.43.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585369
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb0e4470-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/cb14b810-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/cb14b810-71eb-11ee-807d-75267aac45c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..597bf618fe5244d77a6113ff6f6833b069046eea
--- /dev/null
+++ b/graph/incidents_graphml/c/cb14b810-71eb-11ee-807d-75267aac45c9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.202
+ 100.64.10.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698096803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb14b810-71eb-11ee-807d-75267aac45c9
+
+
+
diff --git a/graph/incidents_graphml/c/cb1550f0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/cb1550f0-0da9-11ee-812a-a702327978d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e0e930b1e64f138534255265a01237ec5d4e426
--- /dev/null
+++ b/graph/incidents_graphml/c/cb1550f0-0da9-11ee-812a-a702327978d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.146
+ 100.64.25.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687073340
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb1550f0-0da9-11ee-812a-a702327978d7
+
+
+
diff --git a/graph/incidents_graphml/c/cb1871b0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cb1871b0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f237a17e95fe0cfe07a326296fad4b7a46a6054
--- /dev/null
+++ b/graph/incidents_graphml/c/cb1871b0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.149
+ 100.64.52.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852849
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb1871b0-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/cb1a2da0-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/cb1a2da0-a166-11ed-863f-a161c6cf34a1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1123bc1a56a10e2bd2ae8ff3b95b563517b8978a
--- /dev/null
+++ b/graph/incidents_graphml/c/cb1a2da0-a166-11ed-863f-a161c6cf34a1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.221
+ 100.64.86.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675169838
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb1a2da0-a166-11ed-863f-a161c6cf34a1
+
+
+
diff --git a/graph/incidents_graphml/c/cb1a7970-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/cb1a7970-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ddd671c116e24ccdcba962e8b407b785409ad58
--- /dev/null
+++ b/graph/incidents_graphml/c/cb1a7970-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.231
+ 100.64.55.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585369
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb1a7970-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/cb1c4e30-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb1c4e30-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f925816919cf0995f4581f2d843bc25955d62442
--- /dev/null
+++ b/graph/incidents_graphml/c/cb1c4e30-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.117
+ 100.64.29.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659111
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb1c4e30-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/cb1db010-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/c/cb1db010-a166-11ed-863f-a161c6cf34a1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..134cb79a92dd56d5cbf4d6aa26426a24b010f79e
--- /dev/null
+++ b/graph/incidents_graphml/c/cb1db010-a166-11ed-863f-a161c6cf34a1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.221
+ 100.64.86.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675169838
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb1db010-a166-11ed-863f-a161c6cf34a1
+
+
+
diff --git a/graph/incidents_graphml/c/cb201ad0-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cb201ad0-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99b32c0783c6bda628bf68f22c6dcaddb5a9d464
--- /dev/null
+++ b/graph/incidents_graphml/c/cb201ad0-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.135.182
+ 172.25.135.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.91.74
+ 100.64.91.74
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.20.137.143
+ 172.20.137.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1695936005
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb201ad0-5e44-11ee-8e9d-87ef92e74986
+
+
+ INCIDENT_LINK
+ 1695936005
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb201ad0-5e44-11ee-8e9d-87ef92e74986
+
+
+ INCIDENT_LINK
+ 1695936005
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb201ad0-5e44-11ee-8e9d-87ef92e74986
+
+
+ INCIDENT_LINK
+ 1695936005
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb201ad0-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/cb209e00-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/cb209e00-8c0d-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a297e85b60fbfa240e53ff5208119d6bcbb1232
--- /dev/null
+++ b/graph/incidents_graphml/c/cb209e00-8c0d-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.202
+ 100.64.16.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700970136
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb209e00-8c0d-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/c/cb22d910-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cb22d910-5092-11ee-9f57-f5fa7d55d535.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..271d0900e4ff0060e9f2d5ccec901453ee174337
--- /dev/null
+++ b/graph/incidents_graphml/c/cb22d910-5092-11ee-9f57-f5fa7d55d535.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694430189
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb22d910-5092-11ee-9f57-f5fa7d55d535
+
+
+
diff --git a/graph/incidents_graphml/c/cb246f80-71eb-11ee-807d-75267aac45c9.graphml b/graph/incidents_graphml/c/cb246f80-71eb-11ee-807d-75267aac45c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ba07a0fbd1d4460bc09c97b9f9676f5521e4c0e
--- /dev/null
+++ b/graph/incidents_graphml/c/cb246f80-71eb-11ee-807d-75267aac45c9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.202
+ 100.64.10.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698096803
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb246f80-71eb-11ee-807d-75267aac45c9
+
+
+
diff --git a/graph/incidents_graphml/c/cb283510-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/cb283510-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ab231d84d15e05bf6ed0f84aea109225bf50f35
--- /dev/null
+++ b/graph/incidents_graphml/c/cb283510-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.231
+ 100.64.55.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585369
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb283510-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/cb2cc8f0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb2cc8f0-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc23e4698591ec3acb6ae123304b1e6f20d833e3
--- /dev/null
+++ b/graph/incidents_graphml/c/cb2cc8f0-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.117
+ 100.64.29.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659111
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb2cc8f0-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/cb329f60-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/cb329f60-8c0d-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfc9356cd4b97c47c29986f49e01395678c47623
--- /dev/null
+++ b/graph/incidents_graphml/c/cb329f60-8c0d-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.202
+ 100.64.16.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700970136
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb329f60-8c0d-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/c/cb38f920-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cb38f920-5092-11ee-9f57-f5fa7d55d535.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..069b32c5fe869fc558ff6af58bf87fbde6f8a118
--- /dev/null
+++ b/graph/incidents_graphml/c/cb38f920-5092-11ee-9f57-f5fa7d55d535.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.17
+ 100.64.53.17
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694430190
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb38f920-5092-11ee-9f57-f5fa7d55d535
+
+
+
diff --git a/graph/incidents_graphml/c/cb39c140-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb39c140-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cf50b42b6fc7a11632d97db6aae7f0e189d9df5
--- /dev/null
+++ b/graph/incidents_graphml/c/cb39c140-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.119
+ 100.64.29.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659111
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb39c140-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/cb4707b0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb4707b0-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad6a00e16cd6534f0d595c668cae30948bd55912
--- /dev/null
+++ b/graph/incidents_graphml/c/cb4707b0-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.119
+ 100.64.29.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659111
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb4707b0-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/cb4f9480-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cb4f9480-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b1d80a8b9abc279de929d4181dc263cf31b1220
--- /dev/null
+++ b/graph/incidents_graphml/c/cb4f9480-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.193
+ 100.64.71.193
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660142177
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb4f9480-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cb4f9ff0-2454-11ee-8059-d3725e6f3965.graphml b/graph/incidents_graphml/c/cb4f9ff0-2454-11ee-8059-d3725e6f3965.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49e83641eae64df4d4258760b0268c28b11db791
--- /dev/null
+++ b/graph/incidents_graphml/c/cb4f9ff0-2454-11ee-8059-d3725e6f3965.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.121
+ USER-0015-1242.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689565710
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb4f9ff0-2454-11ee-8059-d3725e6f3965
+
+
+
diff --git a/graph/incidents_graphml/c/cb502aa0-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cb502aa0-5092-11ee-9f57-f5fa7d55d535.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e47ecba42cde6c764f5adf48f89ad32806f1ad46
--- /dev/null
+++ b/graph/incidents_graphml/c/cb502aa0-5092-11ee-9f57-f5fa7d55d535.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.17
+ 100.64.53.17
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694430190
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb502aa0-5092-11ee-9f57-f5fa7d55d535
+
+
+
diff --git a/graph/incidents_graphml/c/cb55af00-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cb55af00-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..104afa032faee6c84f0241703da4dcc693db2807
--- /dev/null
+++ b/graph/incidents_graphml/c/cb55af00-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.193
+ 100.64.71.193
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660142177
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb55af00-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cb577ee0-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cb577ee0-350d-11ee-88fc-a9235afb9237.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b0ee5b0bffa7be8ed3865af933e4490e01a5b4f
--- /dev/null
+++ b/graph/incidents_graphml/c/cb577ee0-350d-11ee-88fc-a9235afb9237.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.220
+ 100.64.76.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691404385
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb577ee0-350d-11ee-88fc-a9235afb9237
+
+
+
diff --git a/graph/incidents_graphml/c/cb668710-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/cb668710-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb56a003f1c12ccbd1c84c24bbad023ae7cfd097
--- /dev/null
+++ b/graph/incidents_graphml/c/cb668710-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.152
+ 100.64.51.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685320135
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb668710-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/cb723270-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cb723270-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aafd4684b8b2dd4ce64a9480b03f5909d393f091
--- /dev/null
+++ b/graph/incidents_graphml/c/cb723270-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.75
+ 100.64.91.75
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695936005
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb723270-5e44-11ee-8e9d-87ef92e74986
+
+
+ INCIDENT_LINK
+ 1695936005
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb723270-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/cb73dae0-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cb73dae0-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5558336ffca7c9686d38278c0c8008d59f9da0a3
--- /dev/null
+++ b/graph/incidents_graphml/c/cb73dae0-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.191
+ 100.64.15.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb73dae0-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/cb746a40-0373-11ed-8991-41244357ae3d.graphml b/graph/incidents_graphml/c/cb746a40-0373-11ed-8991-41244357ae3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96b31e36f62e996fe33b7ebe0f27f17ac8596ca3
--- /dev/null
+++ b/graph/incidents_graphml/c/cb746a40-0373-11ed-8991-41244357ae3d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.36
+ USER-0015-1724.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.19.171
+ 100.64.19.171
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.45
+ 100.64.77.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657803138
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb746a40-0373-11ed-8991-41244357ae3d
+
+
+ INCIDENT_LINK
+ 1657803138
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb746a40-0373-11ed-8991-41244357ae3d
+
+
+ INCIDENT_LINK
+ 1657803138
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb746a40-0373-11ed-8991-41244357ae3d
+
+
+ INCIDENT_LINK
+ 1657803138
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb746a40-0373-11ed-8991-41244357ae3d
+
+
+
diff --git a/graph/incidents_graphml/c/cb7ce4c0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb7ce4c0-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58d75efaa408b1bdc5deb924576a43ce7342e003
--- /dev/null
+++ b/graph/incidents_graphml/c/cb7ce4c0-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.121
+ 100.64.29.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb7ce4c0-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/cb7f8d50-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/cb7f8d50-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2be521f3879e03b6f880b04fb28328b6dbd9e6ff
--- /dev/null
+++ b/graph/incidents_graphml/c/cb7f8d50-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.51.152
+ 100.64.51.152
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685320135
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb7f8d50-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/cb8078b0-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/cb8078b0-f6b2-11ee-b30f-810e76324c4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..235dc6a9fa0efd874871d183e4ca87ea4d960ed0
--- /dev/null
+++ b/graph/incidents_graphml/c/cb8078b0-f6b2-11ee-b30f-810e76324c4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.5
+ 100.64.17.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712695827
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb8078b0-f6b2-11ee-b30f-810e76324c4a
+
+
+
diff --git a/graph/incidents_graphml/c/cb82ad30-5e44-11ee-8e9d-87ef92e74986.graphml b/graph/incidents_graphml/c/cb82ad30-5e44-11ee-8e9d-87ef92e74986.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64618a45c59ec7526e0adf9d9239a7d54c73f5e5
--- /dev/null
+++ b/graph/incidents_graphml/c/cb82ad30-5e44-11ee-8e9d-87ef92e74986.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.75
+ 100.64.91.75
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695936006
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb82ad30-5e44-11ee-8e9d-87ef92e74986
+
+
+
diff --git a/graph/incidents_graphml/c/cb82cf00-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cb82cf00-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5454491fa06a5f91cbfa688ef0f27448a50e571d
--- /dev/null
+++ b/graph/incidents_graphml/c/cb82cf00-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.191
+ 100.64.15.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb82cf00-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/cb85dc00-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/c/cb85dc00-3b73-11ef-b1e4-3da31b742190.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87bf2db557fcbcc71c8d79d8dba68d3511fa6e5e
--- /dev/null
+++ b/graph/incidents_graphml/c/cb85dc00-3b73-11ef-b1e4-3da31b742190.graphml
@@ -0,0 +1,207 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.36
+ 100.64.46.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.37
+ 100.64.46.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.6
+ 100.64.12.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.222
+ 100.64.37.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.38
+ 100.64.46.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720255399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb85dc00-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb85dc00-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb85dc00-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb85dc00-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb85dc00-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb85dc00-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb85dc00-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb85dc00-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb85dc00-3b73-11ef-b1e4-3da31b742190
+
+
+
diff --git a/graph/incidents_graphml/c/cb8a9360-9c1b-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/c/cb8a9360-9c1b-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a8e7615c2599c60c9910ddaf1533f1d9fd5e6c3
--- /dev/null
+++ b/graph/incidents_graphml/c/cb8a9360-9c1b-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.3
+ 100.64.79.3
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1674587871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb8a9360-9c1b-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/c/cb8d0dd0-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cb8d0dd0-350d-11ee-88fc-a9235afb9237.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b42be5affa454558fc79953ea0dc39f6cfe12e7
--- /dev/null
+++ b/graph/incidents_graphml/c/cb8d0dd0-350d-11ee-88fc-a9235afb9237.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.54
+ 100.64.77.54
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691404386
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cb8d0dd0-350d-11ee-88fc-a9235afb9237
+
+
+
diff --git a/graph/incidents_graphml/c/cb8dada0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb8dada0-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b2e95d7f39ecb6b570e147008b73c5979aae593
--- /dev/null
+++ b/graph/incidents_graphml/c/cb8dada0-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.123
+ 100.64.29.123
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb8dada0-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/cb8fa040-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cb8fa040-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..660209b24f4cf6a25a9eb06371a53efc61c74109
--- /dev/null
+++ b/graph/incidents_graphml/c/cb8fa040-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.191
+ 100.64.27.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb8fa040-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/cb9c9b60-4dbd-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/c/cb9c9b60-4dbd-11ee-b251-912537db6da9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d8c85c75f549d284b7c473cf91097cabcf32b0e
--- /dev/null
+++ b/graph/incidents_graphml/c/cb9c9b60-4dbd-11ee-b251-912537db6da9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.253
+ USER-0015-1537.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1694118805
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb9c9b60-4dbd-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694118805
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cb9c9b60-4dbd-11ee-b251-912537db6da9
+
+
+
diff --git a/graph/incidents_graphml/c/cb9d6510-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cb9d6510-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10d5792e0bd91e6eb8846ac88286b5bf2719242c
--- /dev/null
+++ b/graph/incidents_graphml/c/cb9d6510-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.123
+ 100.64.29.123
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb9d6510-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/cb9d7590-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/cb9d7590-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea8bcfd84380aa911a200301db00027161bc34b9
--- /dev/null
+++ b/graph/incidents_graphml/c/cb9d7590-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.203
+ 100.64.26.203
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685320135
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cb9d7590-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/cb9df820-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cb9df820-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd7fc605f84b88f88ec2b96721cd9a2c1eec27fd
--- /dev/null
+++ b/graph/incidents_graphml/c/cb9df820-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.191
+ 100.64.27.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb9df820-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/cb9e4430-0869-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/c/cb9e4430-0869-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13c33776a6a0f88aa64ab8fbc08a32302bcf948b
--- /dev/null
+++ b/graph/incidents_graphml/c/cb9e4430-0869-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.157
+ 100.64.58.157
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714643595
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cb9e4430-0869-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/c/cba4c0d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cba4c0d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ed3802e7d572bba82f48e3dc5e7523b22158343
--- /dev/null
+++ b/graph/incidents_graphml/c/cba4c0d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.158
+ 100.64.35.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cba4c0d0-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/cbae5170-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cbae5170-350d-11ee-88fc-a9235afb9237.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e04627a80e9f15ed5818042a8622d0f928d5dbe
--- /dev/null
+++ b/graph/incidents_graphml/c/cbae5170-350d-11ee-88fc-a9235afb9237.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.54
+ 100.64.77.54
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691404386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cbae5170-350d-11ee-88fc-a9235afb9237
+
+
+
diff --git a/graph/incidents_graphml/c/cbb366d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cbb366d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c250b4ff9f138b9e5476869266e76251eadc4a23
--- /dev/null
+++ b/graph/incidents_graphml/c/cbb366d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.158
+ 100.64.35.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127333
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cbb366d0-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/cbb78d40-fdb7-11ed-bfe2-118d4a616bc2.graphml b/graph/incidents_graphml/c/cbb78d40-fdb7-11ed-bfe2-118d4a616bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f78c21d948b6742e93b88758f8abea8f16c54719
--- /dev/null
+++ b/graph/incidents_graphml/c/cbb78d40-fdb7-11ed-bfe2-118d4a616bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.26.203
+ 100.64.26.203
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685320135
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cbb78d40-fdb7-11ed-bfe2-118d4a616bc2
+
+
+
diff --git a/graph/incidents_graphml/c/cbb89740-f6d2-11ec-a9e6-87496a31758e.graphml b/graph/incidents_graphml/c/cbb89740-f6d2-11ec-a9e6-87496a31758e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a2839b70d8ba181a533b503ff5896d5a5ff66f5
--- /dev/null
+++ b/graph/incidents_graphml/c/cbb89740-f6d2-11ec-a9e6-87496a31758e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.249
+ 100.64.70.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.250
+ 100.64.70.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656414576
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbb89740-f6d2-11ec-a9e6-87496a31758e
+
+
+ INCIDENT_LINK
+ 1656414576
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbb89740-f6d2-11ec-a9e6-87496a31758e
+
+
+
diff --git a/graph/incidents_graphml/c/cbc17090-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cbc17090-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..113a4fc2d401c75a0039bc6d5fe58da67b7d07ed
--- /dev/null
+++ b/graph/incidents_graphml/c/cbc17090-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.151
+ 100.64.56.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbc17090-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/cbc41160-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/cbc41160-f6b2-11ee-b30f-810e76324c4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f82e3bc891ccf51c46da82145f861a573834986
--- /dev/null
+++ b/graph/incidents_graphml/c/cbc41160-f6b2-11ee-b30f-810e76324c4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.153
+ 100.64.52.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712695827
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cbc41160-f6b2-11ee-b30f-810e76324c4a
+
+
+
diff --git a/graph/incidents_graphml/c/cbc88900-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cbc88900-ff26-11ec-890e-b9233ab766d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17cca1e23efb1c8272e83458a37b9fe13dcbd2c1
--- /dev/null
+++ b/graph/incidents_graphml/c/cbc88900-ff26-11ec-890e-b9233ab766d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.188
+ 100.64.73.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657330263
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cbc88900-ff26-11ec-890e-b9233ab766d3
+
+
+
diff --git a/graph/incidents_graphml/c/cbc8fdb0-0869-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/c/cbc8fdb0-0869-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a99c4c9a2b7e075c131a220996daaa1d0447093
--- /dev/null
+++ b/graph/incidents_graphml/c/cbc8fdb0-0869-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.181
+ 100.64.26.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714643595
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbc8fdb0-0869-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/c/cbcdd6a0-e280-11ee-bdbd-61ca27aa8970.graphml b/graph/incidents_graphml/c/cbcdd6a0-e280-11ee-bdbd-61ca27aa8970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce48bd1c2df94e8c7b0a82b62ad161406cd0df51
--- /dev/null
+++ b/graph/incidents_graphml/c/cbcdd6a0-e280-11ee-bdbd-61ca27aa8970.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.1
+ 100.64.62.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.149
+ 100.64.11.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.244
+ 100.64.8.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.1
+ 100.64.62.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.187
+ 100.64.34.187
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475329
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbcdd6a0-e280-11ee-bdbd-61ca27aa8970
+
+
+
diff --git a/graph/incidents_graphml/c/cbd0b2d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cbd0b2d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b6386446085f2bd3e6499091086defffe2162ef
--- /dev/null
+++ b/graph/incidents_graphml/c/cbd0b2d0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.151
+ 100.64.56.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cbd0b2d0-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/cbd27ed0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cbd27ed0-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..626629ea702bcc1601ba82a7316c5bc5f90d5426
--- /dev/null
+++ b/graph/incidents_graphml/c/cbd27ed0-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.125
+ 100.64.29.125
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659112
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cbd27ed0-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/cbd53f40-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cbd53f40-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92bf0ddbba206342fb31eb3367652eabc4501706
--- /dev/null
+++ b/graph/incidents_graphml/c/cbd53f40-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.10
+ 100.64.71.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660142178
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbd53f40-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cbd86700-0869-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/c/cbd86700-0869-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e584dc6baf75c5c3321b3587f7d5cf29aeb5e21
--- /dev/null
+++ b/graph/incidents_graphml/c/cbd86700-0869-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.181
+ 100.64.26.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714643595
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cbd86700-0869-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/c/cbd909b0-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cbd909b0-5092-11ee-9f57-f5fa7d55d535.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3eb19a20308e50178d96b36c744ec7bb9346a922
--- /dev/null
+++ b/graph/incidents_graphml/c/cbd909b0-5092-11ee-9f57-f5fa7d55d535.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.18
+ 100.64.53.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694430191
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbd909b0-5092-11ee-9f57-f5fa7d55d535
+
+
+
diff --git a/graph/incidents_graphml/c/cbda5880-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/cbda5880-f6b2-11ee-b30f-810e76324c4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ced2ea3e2f2a33295493bc3b693b1118a952508
--- /dev/null
+++ b/graph/incidents_graphml/c/cbda5880-f6b2-11ee-b30f-810e76324c4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.132
+ 100.64.37.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712695828
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbda5880-f6b2-11ee-b30f-810e76324c4a
+
+
+
diff --git a/graph/incidents_graphml/c/cbdcb470-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cbdcb470-350d-11ee-88fc-a9235afb9237.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a01f73cfd65de2955977f0e4c311306b3e71877
--- /dev/null
+++ b/graph/incidents_graphml/c/cbdcb470-350d-11ee-88fc-a9235afb9237.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.28
+ 100.64.76.28
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691404386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbdcb470-350d-11ee-88fc-a9235afb9237
+
+
+
diff --git a/graph/incidents_graphml/c/cbe031c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cbe031c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..527230c660847a0486f0e3f0a611b05efdabab01
--- /dev/null
+++ b/graph/incidents_graphml/c/cbe031c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.231
+ 100.64.24.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689180452
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe031c0-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/c/cbe23790-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cbe23790-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a049b28f164d60b67a7742b88e40945ea97d3ab
--- /dev/null
+++ b/graph/incidents_graphml/c/cbe23790-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.10
+ 100.64.71.10
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660142178
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cbe23790-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cbe6bee0-0869-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/c/cbe6bee0-0869-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..053ba4dd64a648ab2dba51132abe79ab18770052
--- /dev/null
+++ b/graph/incidents_graphml/c/cbe6bee0-0869-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.238
+ 100.64.21.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714643595
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbe6bee0-0869-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/c/cbe80760-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/c/cbe80760-4e2d-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..090ebdeaccf3e59b755d2dae3c7d1cd14b1770a2
--- /dev/null
+++ b/graph/incidents_graphml/c/cbe80760-4e2d-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,589 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.213
+ 100.64.28.213
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.89
+ 100.64.13.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.148
+ 100.64.30.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.149
+ 100.64.30.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.150
+ 100.64.30.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.32
+ 100.64.30.32
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.151
+ USER-0015-1285.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.152
+ 100.64.30.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.115
+ 100.64.4.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.153
+ 100.64.30.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.154
+ 100.64.30.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.1
+ 100.64.13.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.247
+ 100.64.25.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.155
+ 100.64.30.155
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbe80760-4e2d-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/c/cbe95d60-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cbe95d60-5092-11ee-9f57-f5fa7d55d535.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34d359dffeeef66d7f453b31f2dc3bdb2ef9edb6
--- /dev/null
+++ b/graph/incidents_graphml/c/cbe95d60-5092-11ee-9f57-f5fa7d55d535.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.18
+ 100.64.53.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694430191
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cbe95d60-5092-11ee-9f57-f5fa7d55d535
+
+
+
diff --git a/graph/incidents_graphml/c/cbe9b840-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/cbe9b840-5cd7-11ee-9b5e-8914f9a5338d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9fb7fa4bc9a733e05070ec8e2cfce02532f1454b
--- /dev/null
+++ b/graph/incidents_graphml/c/cbe9b840-5cd7-11ee-9b5e-8914f9a5338d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.129
+ 100.64.11.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.190.96.179
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695779240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbe9b840-5cd7-11ee-9b5e-8914f9a5338d
+
+
+
diff --git a/graph/incidents_graphml/c/cbec32d0-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/cbec32d0-f6b2-11ee-b30f-810e76324c4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..711a522a80caf958853347aaa5ea6c2f4b578446
--- /dev/null
+++ b/graph/incidents_graphml/c/cbec32d0-f6b2-11ee-b30f-810e76324c4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.132
+ 100.64.37.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712695828
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cbec32d0-f6b2-11ee-b30f-810e76324c4a
+
+
+
diff --git a/graph/incidents_graphml/c/cbefbee0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/c/cbefbee0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccec725f1c48f885f2d5f712eb54a2694ef6510d
--- /dev/null
+++ b/graph/incidents_graphml/c/cbefbee0-6fb3-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.151
+ 100.64.52.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697852850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbefbee0-6fb3-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/c/cbf6feb0-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/cbf6feb0-5cd7-11ee-9b5e-8914f9a5338d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85813923d190e8f1f83ffa05712988d0c567565c
--- /dev/null
+++ b/graph/incidents_graphml/c/cbf6feb0-5cd7-11ee-9b5e-8914f9a5338d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.190.96.179
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.129
+ 100.64.11.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695779240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cbf6feb0-5cd7-11ee-9b5e-8914f9a5338d
+
+
+
diff --git a/graph/incidents_graphml/c/cbf872a0-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cbf872a0-ff26-11ec-890e-b9233ab766d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52a8dee8a1197b86ab834bde007c04382864b443
--- /dev/null
+++ b/graph/incidents_graphml/c/cbf872a0-ff26-11ec-890e-b9233ab766d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.85
+ 100.64.71.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657330263
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbf872a0-ff26-11ec-890e-b9233ab766d3
+
+
+
diff --git a/graph/incidents_graphml/c/cbf8e9e0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cbf8e9e0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f8bcfad34180584b367efd8c17af1e3891dc5bf
--- /dev/null
+++ b/graph/incidents_graphml/c/cbf8e9e0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.231
+ 100.64.24.231
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689180452
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cbf8e9e0-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/c/cbf9b110-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cbf9b110-5092-11ee-9f57-f5fa7d55d535.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..480da2c2023f12f470c5fe92a13e46004814c8fc
--- /dev/null
+++ b/graph/incidents_graphml/c/cbf9b110-5092-11ee-9f57-f5fa7d55d535.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.20
+ 100.64.53.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694430191
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cbf9b110-5092-11ee-9f57-f5fa7d55d535
+
+
+
diff --git a/graph/incidents_graphml/c/cbfcdf70-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cbfcdf70-ff26-11ec-890e-b9233ab766d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c2f2fb0b15bb25466984590397aa1be4915fa6f
--- /dev/null
+++ b/graph/incidents_graphml/c/cbfcdf70-ff26-11ec-890e-b9233ab766d3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.82
+ 100.64.76.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.222
+ 100.64.71.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657330263
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbfcdf70-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330263
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cbfcdf70-ff26-11ec-890e-b9233ab766d3
+
+
+
diff --git a/graph/incidents_graphml/c/cc0439a0-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc0439a0-350d-11ee-88fc-a9235afb9237.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69307271a91956a92c958ca7539b5d10cea67de6
--- /dev/null
+++ b/graph/incidents_graphml/c/cc0439a0-350d-11ee-88fc-a9235afb9237.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.28
+ 100.64.76.28
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691404386
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc0439a0-350d-11ee-88fc-a9235afb9237
+
+
+
diff --git a/graph/incidents_graphml/c/cc0bb270-5092-11ee-9f57-f5fa7d55d535.graphml b/graph/incidents_graphml/c/cc0bb270-5092-11ee-9f57-f5fa7d55d535.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3630045b6ac9556d257e33dcd42ae07f38684461
--- /dev/null
+++ b/graph/incidents_graphml/c/cc0bb270-5092-11ee-9f57-f5fa7d55d535.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.20
+ 100.64.53.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694430191
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cc0bb270-5092-11ee-9f57-f5fa7d55d535
+
+
+
diff --git a/graph/incidents_graphml/c/cc1ccf90-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cc1ccf90-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3e654ba6fcdb0f6a9b767a0b714f7045685e505
--- /dev/null
+++ b/graph/incidents_graphml/c/cc1ccf90-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.155
+ 100.64.73.155
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660142179
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc1ccf90-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cc1d18d0-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc1d18d0-350d-11ee-88fc-a9235afb9237.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbe1325b7f81b02a9a2697b70a37adbf9ab7d55a
--- /dev/null
+++ b/graph/incidents_graphml/c/cc1d18d0-350d-11ee-88fc-a9235afb9237.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.81
+ 100.64.76.81
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691404387
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc1d18d0-350d-11ee-88fc-a9235afb9237
+
+
+
diff --git a/graph/incidents_graphml/c/cc25cef0-52a7-11ee-9df0-27ff5d272c1e.graphml b/graph/incidents_graphml/c/cc25cef0-52a7-11ee-9df0-27ff5d272c1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77ce9fdf0a52d2098d4ddd6ef4629b72f226c9c8
--- /dev/null
+++ b/graph/incidents_graphml/c/cc25cef0-52a7-11ee-9df0-27ff5d272c1e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.127
+ 100.64.29.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694659113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cc25cef0-52a7-11ee-9df0-27ff5d272c1e
+
+
+
diff --git a/graph/incidents_graphml/c/cc269a80-e69d-11ee-8f7e-8d09b3cead02.graphml b/graph/incidents_graphml/c/cc269a80-e69d-11ee-8f7e-8d09b3cead02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..064b112a58bf10d13d863ac28fda57d4d075f6bc
--- /dev/null
+++ b/graph/incidents_graphml/c/cc269a80-e69d-11ee-8f7e-8d09b3cead02.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.24
+ 100.64.18.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.230
+ 100.64.48.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.254
+ 100.64.8.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.181
+ 100.64.56.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710927590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc269a80-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc269a80-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc269a80-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc269a80-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc269a80-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc269a80-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc269a80-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc269a80-e69d-11ee-8f7e-8d09b3cead02
+
+
+
diff --git a/graph/incidents_graphml/c/cc29eef0-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cc29eef0-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c7dc5335a0545d78d8555fc748a12482b4eb2d7
--- /dev/null
+++ b/graph/incidents_graphml/c/cc29eef0-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.155
+ 100.64.73.155
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660142179
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc29eef0-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/c/cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..936e5646a5433261357f7897fd3116bae69b1365
--- /dev/null
+++ b/graph/incidents_graphml/c/cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,517 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.104
+ 100.64.32.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.108
+ USER-0015-1328.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.224
+ 100.64.50.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.129
+ 100.64.17.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.68
+ 100.64.40.68
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.8
+ 100.64.64.8
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.9
+ 100.64.64.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.10
+ 100.64.64.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.11
+ 100.64.64.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.12
+ 100.64.64.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.13
+ USER-0015-1458.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945948
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc2d4e70-1eb1-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/c/cc314380-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/c/cc314380-085f-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..860c6117a844f455c97f7b2153057dd24ea10850
--- /dev/null
+++ b/graph/incidents_graphml/c/cc314380-085f-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.251
+ 100.64.53.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686491803
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc314380-085f-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/c/cc3221d0-6b4f-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/c/cc3221d0-6b4f-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6da5d0d4c1adbb7e12d42f5465655842829cda08
--- /dev/null
+++ b/graph/incidents_graphml/c/cc3221d0-6b4f-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.41
+ USER-0015-1211.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697370096
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc3221d0-6b4f-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/c/cc34a870-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/cc34a870-3245-11ef-9bb6-5bd0425d571b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc0bd77194ede41ced3eebbdcbfa1665ceb067ac
--- /dev/null
+++ b/graph/incidents_graphml/c/cc34a870-3245-11ef-9bb6-5bd0425d571b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.55.16
+ USER-0015-1993.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.86.202
+ 100.64.86.202
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719246083
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc34a870-3245-11ef-9bb6-5bd0425d571b
+
+
+
diff --git a/graph/incidents_graphml/c/cc386900-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc386900-350d-11ee-88fc-a9235afb9237.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a76ef65cf479f95b4beb6b16f828d417bec5a1b
--- /dev/null
+++ b/graph/incidents_graphml/c/cc386900-350d-11ee-88fc-a9235afb9237.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.81
+ 100.64.76.81
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691404387
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc386900-350d-11ee-88fc-a9235afb9237
+
+
+
diff --git a/graph/incidents_graphml/c/cc39dea0-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/cc39dea0-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0070faf4120fdb224c371331e835db0c2f3c2626
--- /dev/null
+++ b/graph/incidents_graphml/c/cc39dea0-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.151
+ 100.64.26.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826880
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cc39dea0-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/cc4c12f0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cc4c12f0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ed01f79d02a1ea13626d8eede679f163bada8fe
--- /dev/null
+++ b/graph/incidents_graphml/c/cc4c12f0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.233
+ 100.64.24.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689180453
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc4c12f0-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/c/cc4f2bc0-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/c/cc4f2bc0-085f-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..401c9ca02f9c3d0c23da4b670ae1c757db34cfc3
--- /dev/null
+++ b/graph/incidents_graphml/c/cc4f2bc0-085f-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.251
+ 100.64.53.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686491803
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc4f2bc0-085f-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/c/cc4f70d0-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/cc4f70d0-182c-11ee-b591-f5bec484f8bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cecf88b924d4a6c7016312f37e1855a026b7d9fd
--- /dev/null
+++ b/graph/incidents_graphml/c/cc4f70d0-182c-11ee-b591-f5bec484f8bc.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.88
+ 100.64.73.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.90
+ 100.64.73.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688229118
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc4f70d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229118
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc4f70d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229118
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc4f70d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229118
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc4f70d0-182c-11ee-b591-f5bec484f8bc
+
+
+
diff --git a/graph/incidents_graphml/c/cc4fb040-ee46-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/c/cc4fb040-ee46-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60c548da82da5cfb453275129fd033d0acf3d49b
--- /dev/null
+++ b/graph/incidents_graphml/c/cc4fb040-ee46-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.125
+ 100.64.57.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711769833
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc4fb040-ee46-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/c/cc5486a0-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/cc5486a0-0725-11ee-9ff8-05edc9624e6c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a388692f51a945b62b53e0dd61f249663cf7b643
--- /dev/null
+++ b/graph/incidents_graphml/c/cc5486a0-0725-11ee-9ff8-05edc9624e6c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.208
+ 100.64.72.208
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686356941
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc5486a0-0725-11ee-9ff8-05edc9624e6c
+
+
+
diff --git a/graph/incidents_graphml/c/cc647d10-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/cc647d10-6618-11ee-9f91-2f1822361879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9448b9cf597c28d4a5ae5fbc6f78a789e320f3c8
--- /dev/null
+++ b/graph/incidents_graphml/c/cc647d10-6618-11ee-9f91-2f1822361879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 172.23.203.103
+ 172.23.203.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696796719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc647d10-6618-11ee-9f91-2f1822361879
+
+
+
diff --git a/graph/incidents_graphml/c/cc64f740-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc64f740-350d-11ee-88fc-a9235afb9237.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6983eac01fbc3f14965057a2809df5009336ae9b
--- /dev/null
+++ b/graph/incidents_graphml/c/cc64f740-350d-11ee-88fc-a9235afb9237.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.34
+ 100.64.75.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691404387
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc64f740-350d-11ee-88fc-a9235afb9237
+
+
+
diff --git a/graph/incidents_graphml/c/cc6502c0-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/cc6502c0-5cd7-11ee-9b5e-8914f9a5338d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d45c9876933205cf49f44507e173004b41116816
--- /dev/null
+++ b/graph/incidents_graphml/c/cc6502c0-5cd7-11ee-9b5e-8914f9a5338d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.36
+ 100.64.52.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695779241
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc6502c0-5cd7-11ee-9b5e-8914f9a5338d
+
+
+
diff --git a/graph/incidents_graphml/c/cc6d44f0-2454-11ee-8059-d3725e6f3965.graphml b/graph/incidents_graphml/c/cc6d44f0-2454-11ee-8059-d3725e6f3965.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a80c3dd6904b34b6a2cbe8e150e1fcdfa7c64b99
--- /dev/null
+++ b/graph/incidents_graphml/c/cc6d44f0-2454-11ee-8059-d3725e6f3965.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.123
+ USER-0015-1243.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689565712
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc6d44f0-2454-11ee-8059-d3725e6f3965
+
+
+ INCIDENT_LINK
+ 1689565712
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc6d44f0-2454-11ee-8059-d3725e6f3965
+
+
+ INCIDENT_LINK
+ 1689565712
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc6d44f0-2454-11ee-8059-d3725e6f3965
+
+
+
diff --git a/graph/incidents_graphml/c/cc6e0210-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/cc6e0210-0725-11ee-9ff8-05edc9624e6c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7766a87dc106e603020db491e6f9f12d6d05b2fa
--- /dev/null
+++ b/graph/incidents_graphml/c/cc6e0210-0725-11ee-9ff8-05edc9624e6c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.208
+ 100.64.72.208
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686356942
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc6e0210-0725-11ee-9ff8-05edc9624e6c
+
+
+
diff --git a/graph/incidents_graphml/c/cc71e3f0-07d1-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/c/cc71e3f0-07d1-11ef-8107-af8140eb4c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90c84a0428cccebcc3b73b6f21515e77303416bc
--- /dev/null
+++ b/graph/incidents_graphml/c/cc71e3f0-07d1-11ef-8107-af8140eb4c5b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.106.136
+ 172.21.106.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Apache Web Server"]
+
+
+ HOST
+ 100.64.86.254
+ 100.64.86.254
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.255
+ 100.64.86.255
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714578313
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc71e3f0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578313
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc71e3f0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578313
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc71e3f0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578313
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc71e3f0-07d1-11ef-8107-af8140eb4c5b
+
+
+
diff --git a/graph/incidents_graphml/c/cc724180-3c0f-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/c/cc724180-3c0f-11ee-96ec-5323ee82cf36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..353801229507fa6b855af1d09144bff09086bb9f
--- /dev/null
+++ b/graph/incidents_graphml/c/cc724180-3c0f-11ee-96ec-5323ee82cf36.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.201
+ 100.64.68.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692174904
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc724180-3c0f-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692174904
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc724180-3c0f-11ee-96ec-5323ee82cf36
+
+
+
diff --git a/graph/incidents_graphml/c/cc72e570-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/c/cc72e570-5cd7-11ee-9b5e-8914f9a5338d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0234d00d78919dec17b19a858598ecd3127dc236
--- /dev/null
+++ b/graph/incidents_graphml/c/cc72e570-5cd7-11ee-9b5e-8914f9a5338d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.52.36
+ 100.64.52.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695779241
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc72e570-5cd7-11ee-9b5e-8914f9a5338d
+
+
+
diff --git a/graph/incidents_graphml/c/cc782df0-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/cc782df0-3027-11ee-a433-a916fb2bb25a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b8343e07936bd32be1ac66c8592f218fffd2105
--- /dev/null
+++ b/graph/incidents_graphml/c/cc782df0-3027-11ee-a433-a916fb2bb25a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690865798
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc782df0-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865798
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc782df0-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865798
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc782df0-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865798
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc782df0-3027-11ee-a433-a916fb2bb25a
+
+
+
diff --git a/graph/incidents_graphml/c/cc7d0e20-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/cc7d0e20-6618-11ee-9f91-2f1822361879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4012754019ad280ee469622abd53e07fd941786
--- /dev/null
+++ b/graph/incidents_graphml/c/cc7d0e20-6618-11ee-9f91-2f1822361879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.222
+ 100.64.83.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696796719
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc7d0e20-6618-11ee-9f91-2f1822361879
+
+
+
diff --git a/graph/incidents_graphml/c/cc7f9850-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/cc7f9850-170a-11ee-9198-135231c2dce9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27ee3ff249f85a7a161a0e4097c876d8f121dad2
--- /dev/null
+++ b/graph/incidents_graphml/c/cc7f9850-170a-11ee-9198-135231c2dce9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.138
+ 100.64.41.138
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688104564
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc7f9850-170a-11ee-9198-135231c2dce9
+
+
+
diff --git a/graph/incidents_graphml/c/cc891b50-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/c/cc891b50-a4a5-11ed-b478-67badd244434.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83be2c2998b75b30b76bd1f66439a0111189579f
--- /dev/null
+++ b/graph/incidents_graphml/c/cc891b50-a4a5-11ed-b478-67badd244434.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.217
+ 100.64.23.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.222
+ 100.64.71.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.228
+ 100.64.71.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.82.149
+ 100.64.82.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.150
+ 100.64.82.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.151
+ 100.64.82.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1675526752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc891b50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc891b50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc891b50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc891b50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc891b50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc891b50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc891b50-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc891b50-a4a5-11ed-b478-67badd244434
+
+
+
diff --git a/graph/incidents_graphml/c/cc89bd50-350d-11ee-88fc-a9235afb9237.graphml b/graph/incidents_graphml/c/cc89bd50-350d-11ee-88fc-a9235afb9237.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7a2adaf65c8ef8fc82b0492034288817deb9e9a
--- /dev/null
+++ b/graph/incidents_graphml/c/cc89bd50-350d-11ee-88fc-a9235afb9237.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.34
+ 100.64.75.34
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691404387
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc89bd50-350d-11ee-88fc-a9235afb9237
+
+
+
diff --git a/graph/incidents_graphml/c/cc8b6600-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/cc8b6600-6618-11ee-9f91-2f1822361879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db471d4c24afa0bec30be140a8f137cbc15d5d10
--- /dev/null
+++ b/graph/incidents_graphml/c/cc8b6600-6618-11ee-9f91-2f1822361879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.83.222
+ 100.64.83.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696796719
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cc8b6600-6618-11ee-9f91-2f1822361879
+
+
+
diff --git a/graph/incidents_graphml/c/cc8d23e0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/cc8d23e0-0da9-11ee-812a-a702327978d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb750859ef4ef3ef987884ef3c3548541844d55e
--- /dev/null
+++ b/graph/incidents_graphml/c/cc8d23e0-0da9-11ee-812a-a702327978d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.148
+ 100.64.25.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687073342
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc8d23e0-0da9-11ee-812a-a702327978d7
+
+
+
diff --git a/graph/incidents_graphml/c/cc952840-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/c/cc952840-45d2-11ee-b6a5-451a7dc3db0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aded30ba8f5f43c944e6d41aba5e21f3cf72b985
--- /dev/null
+++ b/graph/incidents_graphml/c/cc952840-45d2-11ee-b6a5-451a7dc3db0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.239
+ USER-0015-2068.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693248217
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cc952840-45d2-11ee-b6a5-451a7dc3db0a
+
+
+
diff --git a/graph/incidents_graphml/c/cc974210-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/c/cc974210-29ad-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2efeef67e5cd9c3925b1ddd86c9c08797556b7c9
--- /dev/null
+++ b/graph/incidents_graphml/c/cc974210-29ad-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.47
+ 100.64.63.47
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690153693
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cc974210-29ad-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/c/cc9c9940-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/c/cc9c9940-29ad-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29a118da42b73cdf2da24952f254aae3ca6dcaf6
--- /dev/null
+++ b/graph/incidents_graphml/c/cc9c9940-29ad-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.63.47
+ 100.64.63.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690153693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cc9c9940-29ad-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/c/cca09b90-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cca09b90-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..326c33835d908c20c1d390f8608cd64f48757388
--- /dev/null
+++ b/graph/incidents_graphml/c/cca09b90-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.235
+ 100.64.24.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689180453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cca09b90-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/c/cca0f3b0-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cca0f3b0-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50ae440ec39bba92896a5ec4afa22adfc9e31322
--- /dev/null
+++ b/graph/incidents_graphml/c/cca0f3b0-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.135
+ 100.64.78.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660142179
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cca0f3b0-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cca7f890-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cca7f890-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e295e202ce846231ef055b49678399a8df4e6db
--- /dev/null
+++ b/graph/incidents_graphml/c/cca7f890-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.135
+ 100.64.78.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660142180
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cca7f890-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cca88020-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/c/cca88020-29ad-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2febec374f04bce3777480d0860d71817341f225
--- /dev/null
+++ b/graph/incidents_graphml/c/cca88020-29ad-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.28.128
+ 100.64.28.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690153693
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cca88020-29ad-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/c/ccaaee10-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/ccaaee10-170a-11ee-9198-135231c2dce9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a1b4f85a561521964562fda032c10105a97c8b1
--- /dev/null
+++ b/graph/incidents_graphml/c/ccaaee10-170a-11ee-9198-135231c2dce9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.138
+ 100.64.41.138
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688104564
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccaaee10-170a-11ee-9198-135231c2dce9
+
+
+
diff --git a/graph/incidents_graphml/c/ccaf2ad0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/ccaf2ad0-0da9-11ee-812a-a702327978d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87bb74c4aa663beb46cd28c9545510ed85082f0c
--- /dev/null
+++ b/graph/incidents_graphml/c/ccaf2ad0-0da9-11ee-812a-a702327978d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.148
+ 100.64.25.148
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccaf2ad0-0da9-11ee-812a-a702327978d7
+
+
+
diff --git a/graph/incidents_graphml/c/ccb3ae80-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccb3ae80-6618-11ee-9f91-2f1822361879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac1691ee48e8ba2538fcaee45c70f80714ba0a7c
--- /dev/null
+++ b/graph/incidents_graphml/c/ccb3ae80-6618-11ee-9f91-2f1822361879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.132
+ 100.64.9.132
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696796719
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ccb3ae80-6618-11ee-9f91-2f1822361879
+
+
+
diff --git a/graph/incidents_graphml/c/ccbcb7c0-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccbcb7c0-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c92a34d48520b38bdb875671f955823eba2eb30e
--- /dev/null
+++ b/graph/incidents_graphml/c/ccbcb7c0-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.212
+ 100.64.20.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585372
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ccbcb7c0-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/ccbf2010-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/ccbf2010-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad55acdce05088f2e53ff0335798e0aac1c51d72
--- /dev/null
+++ b/graph/incidents_graphml/c/ccbf2010-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.235
+ 100.64.24.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689180454
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccbf2010-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/c/ccc3db20-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccc3db20-6618-11ee-9f91-2f1822361879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f8c907f13d50add8e6f579fe49f4e9148d479cc
--- /dev/null
+++ b/graph/incidents_graphml/c/ccc3db20-6618-11ee-9f91-2f1822361879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.9.132
+ 100.64.9.132
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696796719
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccc3db20-6618-11ee-9f91-2f1822361879
+
+
+
diff --git a/graph/incidents_graphml/c/ccc9fe30-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccc9fe30-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..461d09cb98a7f276c3515c76cd1bb769a1c5d9df
--- /dev/null
+++ b/graph/incidents_graphml/c/ccc9fe30-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.212
+ 100.64.20.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585372
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccc9fe30-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/ccd3f0e0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/ccd3f0e0-0da9-11ee-812a-a702327978d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edd54c6b2ac8150ce5bff05cf6c7758d291f4947
--- /dev/null
+++ b/graph/incidents_graphml/c/ccd3f0e0-0da9-11ee-812a-a702327978d7.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.230
+ 100.64.20.230
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.150
+ 100.64.25.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.151
+ 100.64.25.151
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.152
+ 100.64.25.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.153
+ 100.64.25.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.51
+ 100.64.25.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.154
+ 100.64.25.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.155
+ 100.64.25.155
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.156
+ USER-0015-1256.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.247
+ 100.64.6.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073343
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccd3f0e0-0da9-11ee-812a-a702327978d7
+
+
+
diff --git a/graph/incidents_graphml/c/ccd63330-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccd63330-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d4571719e04ca932998d4a7917ef5aac379d5b9
--- /dev/null
+++ b/graph/incidents_graphml/c/ccd63330-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.233
+ 100.64.55.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585372
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ccd63330-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/ccd82670-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccd82670-6618-11ee-9f91-2f1822361879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bfdbad1df557509b0704f386c053a9984d69a72
--- /dev/null
+++ b/graph/incidents_graphml/c/ccd82670-6618-11ee-9f91-2f1822361879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.196
+ 100.64.24.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696796719
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ccd82670-6618-11ee-9f91-2f1822361879
+
+
+
diff --git a/graph/incidents_graphml/c/ccdbb2c0-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/ccdbb2c0-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ceef1d0ba30a34e01cce44a95904379309eb0175
--- /dev/null
+++ b/graph/incidents_graphml/c/ccdbb2c0-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.136
+ USER-0015-1782.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660142180
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ccdbb2c0-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cce30470-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/cce30470-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc3d97f13f6e96c63d49aa4c5d7ec2ab60921ed5
--- /dev/null
+++ b/graph/incidents_graphml/c/cce30470-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.233
+ 100.64.55.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585372
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cce30470-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/cce3f020-18b9-11ed-abbd-1d596f1eb890.graphml b/graph/incidents_graphml/c/cce3f020-18b9-11ed-abbd-1d596f1eb890.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..339c29db95db48c8f845f98bd2e56127e96f8e5e
--- /dev/null
+++ b/graph/incidents_graphml/c/cce3f020-18b9-11ed-abbd-1d596f1eb890.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.136
+ USER-0015-1782.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660142180
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cce3f020-18b9-11ed-abbd-1d596f1eb890
+
+
+
diff --git a/graph/incidents_graphml/c/cce8b680-2454-11ee-8059-d3725e6f3965.graphml b/graph/incidents_graphml/c/cce8b680-2454-11ee-8059-d3725e6f3965.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bcc2dcbfc932f8f58b35977870291e97f6af7b09
--- /dev/null
+++ b/graph/incidents_graphml/c/cce8b680-2454-11ee-8059-d3725e6f3965.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.187
+ 100.64.16.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689565713
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cce8b680-2454-11ee-8059-d3725e6f3965
+
+
+ INCIDENT_LINK
+ 1689565713
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cce8b680-2454-11ee-8059-d3725e6f3965
+
+
+
diff --git a/graph/incidents_graphml/c/ccedf860-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccedf860-6618-11ee-9f91-2f1822361879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d61782c90c783667a1a73f4ff1251849ed7866d
--- /dev/null
+++ b/graph/incidents_graphml/c/ccedf860-6618-11ee-9f91-2f1822361879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.196
+ 100.64.24.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696796719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccedf860-6618-11ee-9f91-2f1822361879
+
+
+
diff --git a/graph/incidents_graphml/c/ccef3970-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccef3970-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f9b7f81a1114a3e21b0fcc513c3183970e985a0
--- /dev/null
+++ b/graph/incidents_graphml/c/ccef3970-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.235
+ 100.64.55.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585372
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ccef3970-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/ccf0bb30-1e11-11ee-9177-87bbc2825325.graphml b/graph/incidents_graphml/c/ccf0bb30-1e11-11ee-9177-87bbc2825325.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c6db03b2acf9ff0bd1fc58cb994bede7d361756
--- /dev/null
+++ b/graph/incidents_graphml/c/ccf0bb30-1e11-11ee-9177-87bbc2825325.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.248
+ 100.64.70.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688877229
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccf0bb30-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877229
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccf0bb30-1e11-11ee-9177-87bbc2825325
+
+
+
diff --git a/graph/incidents_graphml/c/ccf26c10-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/c/ccf26c10-f75e-11ee-a8c3-edac19687c67.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46447565085fdd41f6baec1e6bcc5c7e8ff94c1c
--- /dev/null
+++ b/graph/incidents_graphml/c/ccf26c10-f75e-11ee-a8c3-edac19687c67.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.146
+ 100.64.68.146
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","Okta","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1712769703
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccf26c10-f75e-11ee-a8c3-edac19687c67
+
+
+
diff --git a/graph/incidents_graphml/c/ccf31090-0725-11ee-9ff8-05edc9624e6c.graphml b/graph/incidents_graphml/c/ccf31090-0725-11ee-9ff8-05edc9624e6c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f28d9fd7160c9b6770fa5e7661929d89a6cc69d
--- /dev/null
+++ b/graph/incidents_graphml/c/ccf31090-0725-11ee-9ff8-05edc9624e6c.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.209
+ 100.64.72.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.15.183
+ 100.64.15.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686356943
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccf31090-0725-11ee-9ff8-05edc9624e6c
+
+
+ INCIDENT_LINK
+ 1686356943
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccf31090-0725-11ee-9ff8-05edc9624e6c
+
+
+ INCIDENT_LINK
+ 1686356943
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ccf31090-0725-11ee-9ff8-05edc9624e6c
+
+
+
diff --git a/graph/incidents_graphml/c/ccf57950-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/c/ccf57950-f75e-11ee-a8c3-edac19687c67.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc55498cba2696730ba5c1845c4112ed475d25c2
--- /dev/null
+++ b/graph/incidents_graphml/c/ccf57950-f75e-11ee-a8c3-edac19687c67.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Okta","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.146
+ 100.64.68.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1712769703
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccf57950-f75e-11ee-a8c3-edac19687c67
+
+
+
diff --git a/graph/incidents_graphml/c/ccfbb400-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/ccfbb400-6618-11ee-9f91-2f1822361879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38adfa101fefe985f063cd21fd0d9c7a2dc60962
--- /dev/null
+++ b/graph/incidents_graphml/c/ccfbb400-6618-11ee-9f91-2f1822361879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.70
+ 100.64.91.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696796720
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccfbb400-6618-11ee-9f91-2f1822361879
+
+
+
diff --git a/graph/incidents_graphml/c/ccfc2510-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/ccfc2510-fa48-11ee-a230-bfe539a81cf2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f797bdc9526a46a37158af8d60e7371de749241
--- /dev/null
+++ b/graph/incidents_graphml/c/ccfc2510-fa48-11ee-a230-bfe539a81cf2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.132
+ 100.64.41.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713090107
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ccfc2510-fa48-11ee-a230-bfe539a81cf2
+
+
+
diff --git a/graph/incidents_graphml/c/ccfe0680-48e3-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/c/ccfe0680-48e3-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3145900a86eba2c2e270deaa2ee4131c7f861424
--- /dev/null
+++ b/graph/incidents_graphml/c/ccfe0680-48e3-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.235
+ 100.64.55.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693585373
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ccfe0680-48e3-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/c/cd07e820-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/c/cd07e820-3b73-11ef-b1e4-3da31b742190.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfc7f05e8a179c56292209c47199463f240503d4
--- /dev/null
+++ b/graph/incidents_graphml/c/cd07e820-3b73-11ef-b1e4-3da31b742190.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.42
+ 100.64.46.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.43
+ 100.64.46.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.44
+ 100.64.46.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.150
+ 100.64.15.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.6
+ 100.64.18.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.45
+ 100.64.46.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.46
+ 100.64.46.46
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.47
+ 100.64.46.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.48
+ 100.64.46.48
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255402
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd07e820-3b73-11ef-b1e4-3da31b742190
+
+
+
diff --git a/graph/incidents_graphml/c/cd0906a0-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd0906a0-1528-11ee-98ae-5dea578eabb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1a0ab57266dfabb19ebd21e7708406d71782f46
--- /dev/null
+++ b/graph/incidents_graphml/c/cd0906a0-1528-11ee-98ae-5dea578eabb6.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.1
+ 100.64.34.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.8
+ 100.64.74.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.64.22
+ 100.64.64.22
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687897547
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0906a0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897547
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0906a0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897547
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0906a0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897547
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0906a0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897547
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0906a0-1528-11ee-98ae-5dea578eabb6
+
+
+
diff --git a/graph/incidents_graphml/c/cd0ead10-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/c/cd0ead10-4e2d-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d9d406282d7f17fb550be743f02bbbcc92352b9
--- /dev/null
+++ b/graph/incidents_graphml/c/cd0ead10-4e2d-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.164
+ 100.64.30.164
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.252
+ 100.64.26.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.43
+ 100.64.14.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.165
+ 100.64.30.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.150
+ 100.64.30.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.166
+ 100.64.30.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.167
+ 100.64.30.167
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.168
+ 100.64.30.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.169
+ 100.64.30.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.140
+ 100.64.23.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.216
+ 100.64.14.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.170
+ 100.64.30.170
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.171
+ 100.64.30.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.202
+ 100.64.14.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.172
+ 100.64.30.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.173
+ 100.64.30.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166911
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd0ead10-4e2d-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/c/cd11ad00-6618-11ee-9f91-2f1822361879.graphml b/graph/incidents_graphml/c/cd11ad00-6618-11ee-9f91-2f1822361879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2eaefb29724d570addb40ef1cb91ac5c84c414e2
--- /dev/null
+++ b/graph/incidents_graphml/c/cd11ad00-6618-11ee-9f91-2f1822361879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.7.183
+ 172.18.7.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.72
+ USER-0015-2065.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696796720
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd11ad00-6618-11ee-9f91-2f1822361879
+
+
+
diff --git a/graph/incidents_graphml/c/cd1b22c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cd1b22c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd90ca4c7bdfbe59aa3725ba47a05cc69dc48380
--- /dev/null
+++ b/graph/incidents_graphml/c/cd1b22c0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.237
+ 100.64.24.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689180454
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd1b22c0-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/c/cd1f40c0-2675-11ed-bc50-5124b5e4dd90.graphml b/graph/incidents_graphml/c/cd1f40c0-2675-11ed-bc50-5124b5e4dd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e42d90d7a6af1d03175bfe30358defab8d33bac
--- /dev/null
+++ b/graph/incidents_graphml/c/cd1f40c0-2675-11ed-bc50-5124b5e4dd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.106
+ 100.64.84.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1661652291
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cd1f40c0-2675-11ed-bc50-5124b5e4dd90
+
+
+
diff --git a/graph/incidents_graphml/c/cd205510-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/cd205510-2d17-11ee-92ce-ad047e277e2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..803f05ab5cfdc346dfba333bcae7c0a55457ac34
--- /dev/null
+++ b/graph/incidents_graphml/c/cd205510-2d17-11ee-92ce-ad047e277e2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.120
+ 100.64.49.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690529074
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd205510-2d17-11ee-92ce-ad047e277e2c
+
+
+
diff --git a/graph/incidents_graphml/c/cd21ae70-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/cd21ae70-fa48-11ee-a230-bfe539a81cf2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbb30e04b152acf9161e211578773e2dee0fdd32
--- /dev/null
+++ b/graph/incidents_graphml/c/cd21ae70-fa48-11ee-a230-bfe539a81cf2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.134
+ 100.64.41.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713090108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cd21ae70-fa48-11ee-a230-bfe539a81cf2
+
+
+
diff --git a/graph/incidents_graphml/c/cd223cc0-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/cd223cc0-3245-11ef-9bb6-5bd0425d571b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8902453dcf7c3e8245e4d193ec90b859076030ed
--- /dev/null
+++ b/graph/incidents_graphml/c/cd223cc0-3245-11ef-9bb6-5bd0425d571b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.203
+ 100.64.86.203
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719246084
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd223cc0-3245-11ef-9bb6-5bd0425d571b
+
+
+
diff --git a/graph/incidents_graphml/c/cd231e50-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd231e50-1528-11ee-98ae-5dea578eabb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aaf52581eba628d1e772300fc62b1b66f33e2d1b
--- /dev/null
+++ b/graph/incidents_graphml/c/cd231e50-1528-11ee-98ae-5dea578eabb6.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.226
+ 100.64.1.226
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.202
+ 100.64.77.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.203
+ 100.64.77.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.24.249
+ 100.64.24.249
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.204
+ 100.64.77.204
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.235
+ 100.64.11.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.18.38
+ 100.64.18.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.48.17
+ 100.64.48.17
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.3
+ 100.64.72.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.205
+ 100.64.77.205
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd231e50-1528-11ee-98ae-5dea578eabb6
+
+
+
diff --git a/graph/incidents_graphml/c/cd3891d0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/cd3891d0-fa48-11ee-a230-bfe539a81cf2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6794dca6ffb6e650c32740171d7c0ed173bb5c90
--- /dev/null
+++ b/graph/incidents_graphml/c/cd3891d0-fa48-11ee-a230-bfe539a81cf2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.134
+ 100.64.41.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713090108
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd3891d0-fa48-11ee-a230-bfe539a81cf2
+
+
+
diff --git a/graph/incidents_graphml/c/cd38a220-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd38a220-1528-11ee-98ae-5dea578eabb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..359620dd0dada44e7af4fc0e2230ffac3ea8942e
--- /dev/null
+++ b/graph/incidents_graphml/c/cd38a220-1528-11ee-98ae-5dea578eabb6.graphml
@@ -0,0 +1,697 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.206
+ 100.64.77.206
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.38
+ 100.64.73.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.207
+ 100.64.77.207
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.208
+ 100.64.77.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.209
+ 100.64.77.209
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.210
+ 100.64.77.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.211
+ 100.64.77.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.212
+ 100.64.77.212
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.213
+ 100.64.77.213
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.214
+ 100.64.77.214
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.215
+ 100.64.77.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.17.1
+ 100.64.17.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.216
+ 100.64.77.216
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.217
+ USER-0015-1765.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.218
+ 100.64.77.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.219
+ 100.64.77.219
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.30.32
+ 100.64.30.32
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.220
+ 100.64.77.220
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.221
+ USER-0015-1766.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.222
+ 100.64.77.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd38a220-1528-11ee-98ae-5dea578eabb6
+
+
+
diff --git a/graph/incidents_graphml/c/cd475dd0-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/cd475dd0-ee30-11ec-9c18-c95a461c6308.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ce3fd25b485a1c089c5af45ee9dda956e42f16d
--- /dev/null
+++ b/graph/incidents_graphml/c/cd475dd0-ee30-11ec-9c18-c95a461c6308.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.29
+ 100.64.80.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.81
+ 100.64.73.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655465391
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cd475dd0-ee30-11ec-9c18-c95a461c6308
+
+
+ INCIDENT_LINK
+ 1655465391
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cd475dd0-ee30-11ec-9c18-c95a461c6308
+
+
+
diff --git a/graph/incidents_graphml/c/cd4987f0-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/cd4987f0-2d17-11ee-92ce-ad047e277e2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3537415499e4684383e358b74ae374aa4cbcaefb
--- /dev/null
+++ b/graph/incidents_graphml/c/cd4987f0-2d17-11ee-92ce-ad047e277e2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.39
+ 100.64.19.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690529074
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cd4987f0-2d17-11ee-92ce-ad047e277e2c
+
+
+
diff --git a/graph/incidents_graphml/c/cd4a9a00-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/c/cd4a9a00-0823-11ee-af5c-6f7331aea810.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9446fd0d7967180a384a9d760b5bdb9ad43f060c
--- /dev/null
+++ b/graph/incidents_graphml/c/cd4a9a00-0823-11ee-af5c-6f7331aea810.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.247
+ 100.64.55.247
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686466035
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd4a9a00-0823-11ee-af5c-6f7331aea810
+
+
+
diff --git a/graph/incidents_graphml/c/cd4ffbe0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/c/cd4ffbe0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f14065b4f8badeedb1c7fada6ee537cd7fbcc82c
--- /dev/null
+++ b/graph/incidents_graphml/c/cd4ffbe0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.57.66
+ 100.64.57.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685492796
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd4ffbe0-ff49-11ed-a0f1-e9dc61d1c5b8
+
+
+
diff --git a/graph/incidents_graphml/c/cd5800b0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/cd5800b0-fa48-11ee-a230-bfe539a81cf2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc69b224c35d7881e62144052a204b4e4b3a98e2
--- /dev/null
+++ b/graph/incidents_graphml/c/cd5800b0-fa48-11ee-a230-bfe539a81cf2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.136
+ 100.64.41.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713090108
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd5800b0-fa48-11ee-a230-bfe539a81cf2
+
+
+
diff --git a/graph/incidents_graphml/c/cd628d40-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/c/cd628d40-13f4-11ee-9bb8-6b8312f57fd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34f47480519f43618e2fcd75c5c2b60d3e400842
--- /dev/null
+++ b/graph/incidents_graphml/c/cd628d40-13f4-11ee-9bb8-6b8312f57fd1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.222
+ 100.64.72.222
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.130
+ 100.64.72.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687765263
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd628d40-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765263
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd628d40-13f4-11ee-9bb8-6b8312f57fd1
+
+
+
diff --git a/graph/incidents_graphml/c/cd6462f0-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/cd6462f0-2d17-11ee-92ce-ad047e277e2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a84921fabf692a3d613565c0979301d1525c1c30
--- /dev/null
+++ b/graph/incidents_graphml/c/cd6462f0-2d17-11ee-92ce-ad047e277e2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.39
+ 100.64.19.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690529074
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cd6462f0-2d17-11ee-92ce-ad047e277e2c
+
+
+
diff --git a/graph/incidents_graphml/c/cd6b71f0-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd6b71f0-1528-11ee-98ae-5dea578eabb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a8a320191b09c6105cfa8331d6e010569f3efe6
--- /dev/null
+++ b/graph/incidents_graphml/c/cd6b71f0-1528-11ee-98ae-5dea578eabb6.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.55
+ 100.64.69.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.32
+ 100.64.73.32
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.173
+ 100.64.1.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.231
+ USER-0015-1767.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd6b71f0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd6b71f0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd6b71f0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd6b71f0-1528-11ee-98ae-5dea578eabb6
+
+
+
diff --git a/graph/incidents_graphml/c/cd704990-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/cd704990-3027-11ee-a433-a916fb2bb25a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddf6910bcd29e38fb00274e5f601f13dca79a880
--- /dev/null
+++ b/graph/incidents_graphml/c/cd704990-3027-11ee-a433-a916fb2bb25a.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.242
+ 100.64.12.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.30.32
+ 100.64.30.32
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.74
+ 100.64.69.74
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.75
+ 100.64.69.75
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.189
+ 100.64.12.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.76
+ USER-0015-1518.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.53.192
+ 100.64.53.192
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865800
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd704990-3027-11ee-a433-a916fb2bb25a
+
+
+
diff --git a/graph/incidents_graphml/c/cd792280-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/c/cd792280-13f4-11ee-9bb8-6b8312f57fd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f061d9c1d008614b6745e052f68ec832c45e12b
--- /dev/null
+++ b/graph/incidents_graphml/c/cd792280-13f4-11ee-9bb8-6b8312f57fd1.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.223
+ 100.64.72.223
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.41
+ 100.64.71.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.224
+ 100.64.72.224
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687765263
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd792280-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765263
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd792280-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765263
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd792280-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765263
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd792280-13f4-11ee-9bb8-6b8312f57fd1
+
+
+
diff --git a/graph/incidents_graphml/c/cd82a740-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/c/cd82a740-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..813d3817948c52f9a69d14cf9e8f9690adc0f40c
--- /dev/null
+++ b/graph/incidents_graphml/c/cd82a740-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.42
+ 100.64.86.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678199082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cd82a740-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/c/cd8550f0-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/c/cd8550f0-274f-11ee-9ae4-f7600c9ae4b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..622921abc3e165d68bf784234d7f1e107d7c249e
--- /dev/null
+++ b/graph/incidents_graphml/c/cd8550f0-274f-11ee-9ae4-f7600c9ae4b6.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.75
+ 100.64.63.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.203
+ 100.64.7.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.128
+ 100.64.25.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.189
+ 100.64.14.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd8550f0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+
diff --git a/graph/incidents_graphml/c/cd869be0-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/c/cd869be0-60a7-11ee-a238-43fa5b505c3f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efcbead69fa9035c88e0845619a8cd8b73ed0bd9
--- /dev/null
+++ b/graph/incidents_graphml/c/cd869be0-60a7-11ee-a238-43fa5b505c3f.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.198
+ 172.25.216.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.78
+ 100.64.94.78
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.79
+ USER-0015-2110.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696198432
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd869be0-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198432
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd869be0-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198432
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd869be0-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198432
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd869be0-60a7-11ee-a238-43fa5b505c3f
+
+
+
diff --git a/graph/incidents_graphml/c/cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f09d3e29126f3e38f0fa9e4493523c0f8766cb7
--- /dev/null
+++ b/graph/incidents_graphml/c/cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.239
+ 100.64.24.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689180455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+ INCIDENT_LINK
+ 1689180455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+ INCIDENT_LINK
+ 1689180455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cd8b97d0-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/c/cd94cbe0-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cd94cbe0-1528-11ee-98ae-5dea578eabb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96c0f89e1ea014f4c8209b30a63b03bef53c6da9
--- /dev/null
+++ b/graph/incidents_graphml/c/cd94cbe0-1528-11ee-98ae-5dea578eabb6.graphml
@@ -0,0 +1,279 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.232
+ 100.64.77.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.49
+ 100.64.72.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.233
+ 100.64.77.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.234
+ 100.64.77.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.235
+ 100.64.77.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.7.76
+ 100.64.7.76
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.18.66
+ 100.64.18.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd94cbe0-1528-11ee-98ae-5dea578eabb6
+
+
+
diff --git a/graph/incidents_graphml/c/cd9821f0-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/c/cd9821f0-f75e-11ee-a8c3-edac19687c67.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae5ef46c2f0b7605b4d9c0d0169a6e24aee87f31
--- /dev/null
+++ b/graph/incidents_graphml/c/cd9821f0-f75e-11ee-a8c3-edac19687c67.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.22.152
+ 100.64.22.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1712769704
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cd9821f0-f75e-11ee-a8c3-edac19687c67
+
+
+
diff --git a/graph/incidents_graphml/c/cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/c/cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81d2860e1bd0d0d3ad64d85d6f518eb59d49caa5
--- /dev/null
+++ b/graph/incidents_graphml/c/cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.77
+ 100.64.63.77
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.110
+ 100.64.23.110
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.2
+ 100.64.18.2
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893420
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd9aadb0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+
diff --git a/graph/incidents_graphml/c/cd9c1f70-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/c/cd9c1f70-10b5-11ee-aed8-b565505929b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..951889e0b5d4b1fb6dccb2d921fc8eba5efba325
--- /dev/null
+++ b/graph/incidents_graphml/c/cd9c1f70-10b5-11ee-aed8-b565505929b5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.61
+ 100.64.68.61
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1687408351
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd9c1f70-10b5-11ee-aed8-b565505929b5
+
+
+ INCIDENT_LINK
+ 1687408351
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cd9c1f70-10b5-11ee-aed8-b565505929b5
+
+
+
diff --git a/graph/incidents_graphml/c/cda3c000-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cda3c000-1528-11ee-98ae-5dea578eabb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fff877ed6f7af02ba094d4fb17df2afcab491696
--- /dev/null
+++ b/graph/incidents_graphml/c/cda3c000-1528-11ee-98ae-5dea578eabb6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.30.64
+ 192.168.30.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.236
+ 100.64.77.236
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cda3c000-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cda3c000-1528-11ee-98ae-5dea578eabb6
+
+
+
diff --git a/graph/incidents_graphml/c/cdbe59e0-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/cdbe59e0-170a-11ee-9198-135231c2dce9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f807db0690c3353fad9af550a54f3afedf5c6ab
--- /dev/null
+++ b/graph/incidents_graphml/c/cdbe59e0-170a-11ee-9198-135231c2dce9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.140
+ 100.64.41.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688104566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdbe59e0-170a-11ee-9198-135231c2dce9
+
+
+
diff --git a/graph/incidents_graphml/c/cdc1ea10-20d3-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/c/cdc1ea10-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8f72e61f449f23903dc07451bc7616b69192421
--- /dev/null
+++ b/graph/incidents_graphml/c/cdc1ea10-20d3-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.241
+ 100.64.24.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689180455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc1ea10-20d3-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/c/cdc3bcc0-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cdc3bcc0-ff26-11ec-890e-b9233ab766d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c928357d7a75180b7a8e74bab26623951aeb8a6e
--- /dev/null
+++ b/graph/incidents_graphml/c/cdc3bcc0-ff26-11ec-890e-b9233ab766d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.83
+ USER-0015-1733.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657330266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc3bcc0-ff26-11ec-890e-b9233ab766d3
+
+
+
diff --git a/graph/incidents_graphml/c/cdc68a40-1528-11ee-98ae-5dea578eabb6.graphml b/graph/incidents_graphml/c/cdc68a40-1528-11ee-98ae-5dea578eabb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f4734b8e3ccb30c9a3884e41b784918756f9b0f
--- /dev/null
+++ b/graph/incidents_graphml/c/cdc68a40-1528-11ee-98ae-5dea578eabb6.graphml
@@ -0,0 +1,373 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.202
+ 100.64.20.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.119
+ 100.64.7.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.5.116
+ 100.64.5.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.1
+ 100.64.13.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.24.248
+ 100.64.24.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+ INCIDENT_LINK
+ 1687897549
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdc68a40-1528-11ee-98ae-5dea578eabb6
+
+
+
diff --git a/graph/incidents_graphml/c/cdca4c70-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cdca4c70-ff26-11ec-890e-b9233ab766d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5842b969f58d3490fc531ba1a1552eed158f0a27
--- /dev/null
+++ b/graph/incidents_graphml/c/cdca4c70-ff26-11ec-890e-b9233ab766d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.83
+ USER-0015-1733.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657330266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdca4c70-ff26-11ec-890e-b9233ab766d3
+
+
+
diff --git a/graph/incidents_graphml/c/cdccd6e0-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/cdccd6e0-3d6c-11ee-b209-c721199fad49.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d119ec295c2d0ebde2ed1a298b2ec51d2cbe9851
--- /dev/null
+++ b/graph/incidents_graphml/c/cdccd6e0-3d6c-11ee-b209-c721199fad49.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.209
+ 100.64.12.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692324801
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdccd6e0-3d6c-11ee-b209-c721199fad49
+
+
+
diff --git a/graph/incidents_graphml/c/cdce2f60-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/c/cdce2f60-45d0-11ee-95ea-81d84bb304b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93d4d0b7e9e593e220a290a7e3abcadbf64cca0d
--- /dev/null
+++ b/graph/incidents_graphml/c/cdce2f60-45d0-11ee-95ea-81d84bb304b3.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.29
+ 100.64.23.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.165
+ USER-0015-1528.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.166
+ 100.64.69.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.45.239
+ 100.64.45.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.167
+ 100.64.69.167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdce2f60-45d0-11ee-95ea-81d84bb304b3
+
+
+
diff --git a/graph/incidents_graphml/c/cdd55970-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/cdd55970-3d0b-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85a45cf655b90f6d0dac6d110518d45a21a702ca
--- /dev/null
+++ b/graph/incidents_graphml/c/cdd55970-3d0b-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.234
+ 100.64.59.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdd55970-3d0b-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/c/cddc05d0-18e9-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/c/cddc05d0-18e9-11ef-94b0-d3858c4ed3ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7a155d2677f689026dacd33fb65a5db9d6a87d1
--- /dev/null
+++ b/graph/incidents_graphml/c/cddc05d0-18e9-11ef-94b0-d3858c4ed3ac.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.206
+ 100.64.95.206
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.241
+ 100.64.88.241
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.207
+ 100.64.95.207
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716457793
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cddc05d0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457793
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cddc05d0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457793
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cddc05d0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457793
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cddc05d0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457793
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cddc05d0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457793
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cddc05d0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+
diff --git a/graph/incidents_graphml/c/cde25270-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/c/cde25270-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0851480da839febf0eddf5ad28ffb7873da54e72
--- /dev/null
+++ b/graph/incidents_graphml/c/cde25270-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.34
+ 100.64.81.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.53
+ 100.64.73.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cde25270-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cde25270-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/c/cdeeae80-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/c/cdeeae80-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab413ade10908b5fecfed648c6d305b2188079ca
--- /dev/null
+++ b/graph/incidents_graphml/c/cdeeae80-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,755 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.35
+ 100.64.81.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.36
+ USER-0015-1858.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.88
+ 100.64.79.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.37
+ USER-0015-1859.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.38
+ USER-0015-1860.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.16.113
+ 100.64.16.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.39
+ 100.64.81.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.40
+ 100.64.81.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.244
+ USER-0015-1861.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.44
+ USER-0015-1862.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.41
+ USER-0015-1863.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.42
+ USER-0015-1864.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.43
+ 100.64.81.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.44
+ USER-0015-1865.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.45
+ 100.64.81.45
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.46
+ 100.64.81.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.239
+ USER-0015-1607.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.47
+ USER-0015-1866.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.130
+ 100.64.77.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.48
+ 100.64.81.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.49
+ 100.64.81.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdeeae80-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/c/cdf21410-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/cdf21410-170a-11ee-9198-135231c2dce9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c65cadc3292008e103a89f80944de7b2adcc1ac4
--- /dev/null
+++ b/graph/incidents_graphml/c/cdf21410-170a-11ee-9198-135231c2dce9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.140
+ 100.64.41.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688104567
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cdf21410-170a-11ee-9198-135231c2dce9
+
+
+
diff --git a/graph/incidents_graphml/c/cdf23040-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/cdf23040-3d0b-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d993a92b3482892aff45e2d775ca270d59180b58
--- /dev/null
+++ b/graph/incidents_graphml/c/cdf23040-3d0b-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.234
+ 100.64.59.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdf23040-3d0b-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/c/cdf71a30-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/c/cdf71a30-9773-11ed-8e25-218966643970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a85c9f52583598593537514281b8fda91086110a
--- /dev/null
+++ b/graph/incidents_graphml/c/cdf71a30-9773-11ed-8e25-218966643970.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1674075915
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cdf71a30-9773-11ed-8e25-218966643970
+
+
+ INCIDENT_LINK
+ 1674075915
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cdf71a30-9773-11ed-8e25-218966643970
+
+
+
diff --git a/graph/incidents_graphml/c/cdfa6e50-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/c/cdfa6e50-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7e289a7b9d7b399a7c4042ffca9cc7bb542c01a
--- /dev/null
+++ b/graph/incidents_graphml/c/cdfa6e50-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.71
+ 100.64.81.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.49
+ 100.64.72.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.250
+ 100.64.71.250
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.2.136
+ 100.64.2.136
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdfa6e50-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdfa6e50-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdfa6e50-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdfa6e50-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdfa6e50-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cdfa6e50-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/c/cdfae980-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/cdfae980-3245-11ef-9bb6-5bd0425d571b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ea4bb06db95963823b2b7d82031776c4fccb3fd
--- /dev/null
+++ b/graph/incidents_graphml/c/cdfae980-3245-11ef-9bb6-5bd0425d571b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.205
+ USER-0015-1994.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1719246086
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cdfae980-3245-11ef-9bb6-5bd0425d571b
+
+
+
diff --git a/graph/incidents_graphml/c/ce03e9d0-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/c/ce03e9d0-9562-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5f8d8af3d66c15afab803145c688117d34a6864
--- /dev/null
+++ b/graph/incidents_graphml/c/ce03e9d0-9562-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.26
+ 100.64.65.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.156
+ 100.64.72.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1673848711
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce03e9d0-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848711
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce03e9d0-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848711
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce03e9d0-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848711
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce03e9d0-9562-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/c/ce052250-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/c/ce052250-9562-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ac474c0c9a72d59a822672d97efd9b0d196d41a
--- /dev/null
+++ b/graph/incidents_graphml/c/ce052250-9562-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.160
+ 100.64.78.160
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.224
+ 100.64.71.224
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1673848711
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce052250-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848711
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce052250-9562-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/c/ce0ff170-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ce0ff170-3d0b-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13cbda38be82bd551c4a88ca955d697f3b14275a
--- /dev/null
+++ b/graph/incidents_graphml/c/ce0ff170-3d0b-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.110
+ 100.64.35.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce0ff170-3d0b-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/c/ce1a29c0-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/ce1a29c0-285f-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..106b6167c277c9559ef3305eb1683916c87523ea
--- /dev/null
+++ b/graph/incidents_graphml/c/ce1a29c0-285f-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.252
+ 100.64.38.252
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718157741
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce1a29c0-285f-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/c/ce1b90e0-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/ce1b90e0-3245-11ef-9bb6-5bd0425d571b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43e9364c8e5d9cfb80e43cc89fa389c9303e683b
--- /dev/null
+++ b/graph/incidents_graphml/c/ce1b90e0-3245-11ef-9bb6-5bd0425d571b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.205
+ USER-0015-1994.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719246086
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ce1b90e0-3245-11ef-9bb6-5bd0425d571b
+
+
+
diff --git a/graph/incidents_graphml/c/ce25a730-170a-11ee-9198-135231c2dce9.graphml b/graph/incidents_graphml/c/ce25a730-170a-11ee-9198-135231c2dce9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70e87f9b6feaeced7c74bf92f234fe64360a4910
--- /dev/null
+++ b/graph/incidents_graphml/c/ce25a730-170a-11ee-9198-135231c2dce9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.57
+ USER-0015-1332.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688104567
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ce25a730-170a-11ee-9198-135231c2dce9
+
+
+ INCIDENT_LINK
+ 1688104567
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ce25a730-170a-11ee-9198-135231c2dce9
+
+
+
diff --git a/graph/incidents_graphml/c/ce2a2e10-2698-11ef-9cc1-636a286f4a71.graphml b/graph/incidents_graphml/c/ce2a2e10-2698-11ef-9cc1-636a286f4a71.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f84db51c9634276b140b15d4bcf8afea0cc7d5e
--- /dev/null
+++ b/graph/incidents_graphml/c/ce2a2e10-2698-11ef-9cc1-636a286f4a71.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.111
+ 100.64.34.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717962320
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce2a2e10-2698-11ef-9cc1-636a286f4a71
+
+
+ INCIDENT_LINK
+ 1717962320
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce2a2e10-2698-11ef-9cc1-636a286f4a71
+
+
+
diff --git a/graph/incidents_graphml/c/ce2a2f50-285f-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/c/ce2a2f50-285f-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7301f1229f05ed226968cbef893e117584eb8c79
--- /dev/null
+++ b/graph/incidents_graphml/c/ce2a2f50-285f-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.252
+ 100.64.38.252
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718157741
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ce2a2f50-285f-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/c/ce2c7e80-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce2c7e80-4423-11ed-8338-1b551ccaa997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1e8a98d3a7cda661e1d7092993bec936435cffe
--- /dev/null
+++ b/graph/incidents_graphml/c/ce2c7e80-4423-11ed-8338-1b551ccaa997.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.44
+ 100.64.75.44
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 172.21.30.204
+ 172.21.30.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.51
+ 100.64.72.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1664915609
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce2c7e80-4423-11ed-8338-1b551ccaa997
+
+
+ INCIDENT_LINK
+ 1664915609
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce2c7e80-4423-11ed-8338-1b551ccaa997
+
+
+ INCIDENT_LINK
+ 1664915609
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce2c7e80-4423-11ed-8338-1b551ccaa997
+
+
+ INCIDENT_LINK
+ 1664915609
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce2c7e80-4423-11ed-8338-1b551ccaa997
+
+
+
diff --git a/graph/incidents_graphml/c/ce2f6050-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ce2f6050-3d0b-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7ebf8910d52fb2a00760ffaa1902ecca607380b
--- /dev/null
+++ b/graph/incidents_graphml/c/ce2f6050-3d0b-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.110
+ 100.64.35.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ce2f6050-3d0b-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/c/ce3abe30-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/ce3abe30-89bb-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9c7fae9006c799b56caf41bc65b2234fb1aee58
--- /dev/null
+++ b/graph/incidents_graphml/c/ce3abe30-89bb-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.87
+ 100.64.33.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700715020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ce3abe30-89bb-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/c/ce47dd90-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/ce47dd90-89bb-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..685319f5fcad16fd1e8032aaeb6a1eb529d75962
--- /dev/null
+++ b/graph/incidents_graphml/c/ce47dd90-89bb-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.95
+ 100.64.42.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700715020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce47dd90-89bb-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/c/ce4b71b0-2698-11ef-9cc1-636a286f4a71.graphml b/graph/incidents_graphml/c/ce4b71b0-2698-11ef-9cc1-636a286f4a71.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e084099527db1d05ac4510750e16ff5e31bdb526
--- /dev/null
+++ b/graph/incidents_graphml/c/ce4b71b0-2698-11ef-9cc1-636a286f4a71.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.111
+ 100.64.34.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717962321
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ce4b71b0-2698-11ef-9cc1-636a286f4a71
+
+
+
diff --git a/graph/incidents_graphml/c/ce4de6b0-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/ce4de6b0-0da9-11ee-812a-a702327978d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18aff35dd5ff6b2c9756d519ee40a5d3c630f62d
--- /dev/null
+++ b/graph/incidents_graphml/c/ce4de6b0-0da9-11ee-812a-a702327978d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.164
+ 100.64.25.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687073345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce4de6b0-0da9-11ee-812a-a702327978d7
+
+
+
diff --git a/graph/incidents_graphml/c/ce5339b0-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/c/ce5339b0-017b-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd3d14f7dcd6222db5295aa480eab8fc2db32ac1
--- /dev/null
+++ b/graph/incidents_graphml/c/ce5339b0-017b-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.178.143
+ 192.168.178.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 192.168.96.87
+ 192.168.96.87
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685734175
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ce5339b0-017b-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685734175
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ce5339b0-017b-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/c/ce544d70-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ce544d70-3d0b-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a91b2350199b2fe3c8ab48aa53d44e54f96fdd9f
--- /dev/null
+++ b/graph/incidents_graphml/c/ce544d70-3d0b-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.235
+ 100.64.59.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce544d70-3d0b-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/c/ce5c6de0-0829-11ef-9432-0316676438e6.graphml b/graph/incidents_graphml/c/ce5c6de0-0829-11ef-9432-0316676438e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79813731f306580958210ab699fbc0fb513527e5
--- /dev/null
+++ b/graph/incidents_graphml/c/ce5c6de0-0829-11ef-9432-0316676438e6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.135.111
+ 172.16.135.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory","Stealthwatch"]
+
+
+ HOST
+ 100.64.97.162
+ 100.64.97.162
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714616112
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce5c6de0-0829-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616112
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce5c6de0-0829-11ef-9432-0316676438e6
+
+
+
diff --git a/graph/incidents_graphml/c/ce5cec30-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/ce5cec30-89bb-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e67fb06e46c74623e35da74f8b42bf52761d8af4
--- /dev/null
+++ b/graph/incidents_graphml/c/ce5cec30-89bb-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.95
+ 100.64.42.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700715021
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ce5cec30-89bb-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/c/ce5fea90-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce5fea90-4423-11ed-8338-1b551ccaa997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e6601cd6fcc449efcdb4561f14e0556d88a0928
--- /dev/null
+++ b/graph/incidents_graphml/c/ce5fea90-4423-11ed-8338-1b551ccaa997.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.45
+ 100.64.75.45
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1664915609
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce5fea90-4423-11ed-8338-1b551ccaa997
+
+
+
diff --git a/graph/incidents_graphml/c/ce6c8e10-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/c/ce6c8e10-017b-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d88bb23a0556d9e0ef0775150b6fea82e53e70d
--- /dev/null
+++ b/graph/incidents_graphml/c/ce6c8e10-017b-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.79.215
+ 100.64.79.215
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685734175
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ce6c8e10-017b-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/c/ce72d650-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce72d650-4423-11ed-8338-1b551ccaa997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cad82cb2fa72e07f7ebde2621399e0982cd58ae
--- /dev/null
+++ b/graph/incidents_graphml/c/ce72d650-4423-11ed-8338-1b551ccaa997.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.45
+ 100.64.75.45
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664915609
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ce72d650-4423-11ed-8338-1b551ccaa997
+
+
+
diff --git a/graph/incidents_graphml/c/ce76f500-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce76f500-4423-11ed-8338-1b551ccaa997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0411db13a771ce116dd95f1ad34e47b097d13533
--- /dev/null
+++ b/graph/incidents_graphml/c/ce76f500-4423-11ed-8338-1b551ccaa997.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.46
+ 100.64.75.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1664915609
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce76f500-4423-11ed-8338-1b551ccaa997
+
+
+
diff --git a/graph/incidents_graphml/c/ce7a18b0-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/ce7a18b0-2d17-11ee-92ce-ad047e277e2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e59114234d1d0259324a3ca304ee0d67000e93c
--- /dev/null
+++ b/graph/incidents_graphml/c/ce7a18b0-2d17-11ee-92ce-ad047e277e2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.122
+ 100.64.49.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690529076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce7a18b0-2d17-11ee-92ce-ad047e277e2c
+
+
+
diff --git a/graph/incidents_graphml/c/ce7d5da0-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ce7d5da0-4423-11ed-8338-1b551ccaa997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fdfd8b560782397468b0745b7c118ea786ff73b
--- /dev/null
+++ b/graph/incidents_graphml/c/ce7d5da0-4423-11ed-8338-1b551ccaa997.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.46
+ 100.64.75.46
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1664915609
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ce7d5da0-4423-11ed-8338-1b551ccaa997
+
+
+
diff --git a/graph/incidents_graphml/c/ce891910-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/c/ce891910-3d0b-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2cf5466c26e876fda6c83eeb12188c4b695d3a4
--- /dev/null
+++ b/graph/incidents_graphml/c/ce891910-3d0b-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.235
+ 100.64.59.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ce891910-3d0b-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/c/ce945770-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/ce945770-2d17-11ee-92ce-ad047e277e2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ac03ca54ca92d402da38a6a386b42db38d8ff17
--- /dev/null
+++ b/graph/incidents_graphml/c/ce945770-2d17-11ee-92ce-ad047e277e2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.122
+ 100.64.49.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690529076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ce945770-2d17-11ee-92ce-ad047e277e2c
+
+
+
diff --git a/graph/incidents_graphml/c/ce9921a0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/ce9921a0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..440bfa4745119481a60b37870299b60e926af40d
--- /dev/null
+++ b/graph/incidents_graphml/c/ce9921a0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.166
+ 100.64.19.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ce9921a0-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/ce9c2040-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/c/ce9c2040-0823-11ee-af5c-6f7331aea810.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..becc290bf70ed0a0bf87d2ea52309139c96b8a20
--- /dev/null
+++ b/graph/incidents_graphml/c/ce9c2040-0823-11ee-af5c-6f7331aea810.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.249
+ 100.64.55.249
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686466038
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce9c2040-0823-11ee-af5c-6f7331aea810
+
+
+
diff --git a/graph/incidents_graphml/c/ce9dbb70-3d6c-11ee-b209-c721199fad49.graphml b/graph/incidents_graphml/c/ce9dbb70-3d6c-11ee-b209-c721199fad49.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..067134d325552511a36b2c0cd308c4303c7dfada
--- /dev/null
+++ b/graph/incidents_graphml/c/ce9dbb70-3d6c-11ee-b209-c721199fad49.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.41
+ 100.64.11.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692324802
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ce9dbb70-3d6c-11ee-b209-c721199fad49
+
+
+
diff --git a/graph/incidents_graphml/c/cea7eeb0-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cea7eeb0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7429dc3918d6f2d07feb1e50211db013bdeecb5
--- /dev/null
+++ b/graph/incidents_graphml/c/cea7eeb0-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.166
+ 100.64.19.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cea7eeb0-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/ceaa9e90-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/ceaa9e90-2d17-11ee-92ce-ad047e277e2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49cb24f4b0855704ede73f91bf154f02a095065d
--- /dev/null
+++ b/graph/incidents_graphml/c/ceaa9e90-2d17-11ee-92ce-ad047e277e2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.124
+ 100.64.49.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690529077
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ceaa9e90-2d17-11ee-92ce-ad047e277e2c
+
+
+
diff --git a/graph/incidents_graphml/c/ceaec830-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/c/ceaec830-60a7-11ee-a238-43fa5b505c3f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..755c06fd18cd858798efe140735ea74540384d44
--- /dev/null
+++ b/graph/incidents_graphml/c/ceaec830-60a7-11ee-a238-43fa5b505c3f.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.212.82
+ 192.168.212.82
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.82
+ USER-0015-2111.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.83
+ USER-0015-2112.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696198433
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ceaec830-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198433
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ceaec830-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198433
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ceaec830-60a7-11ee-a238-43fa5b505c3f
+
+
+ INCIDENT_LINK
+ 1696198433
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ceaec830-60a7-11ee-a238-43fa5b505c3f
+
+
+
diff --git a/graph/incidents_graphml/c/ceb0f770-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/ceb0f770-5b8b-11ee-9925-ebc6745d6541.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf768e7e7a3e9f056eb7e7d377aa1ed75f82460a
--- /dev/null
+++ b/graph/incidents_graphml/c/ceb0f770-5b8b-11ee-9925-ebc6745d6541.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.1
+ 100.64.17.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695636652
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ceb0f770-5b8b-11ee-9925-ebc6745d6541
+
+
+
diff --git a/graph/incidents_graphml/c/ceb58340-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/ceb58340-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..743c349d8098fa2d1f30951f37a1805e67fde1f5
--- /dev/null
+++ b/graph/incidents_graphml/c/ceb58340-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.166
+ 100.64.19.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ceb58340-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/cebcd770-f84f-11ec-8cad-d3b902a073da.graphml b/graph/incidents_graphml/c/cebcd770-f84f-11ec-8cad-d3b902a073da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a55f40eb173d09d9244bd6c77011ffb37d3b7ad
--- /dev/null
+++ b/graph/incidents_graphml/c/cebcd770-f84f-11ec-8cad-d3b902a073da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.245
+ 100.64.70.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.246
+ 100.64.70.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656578219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cebcd770-f84f-11ec-8cad-d3b902a073da
+
+
+
diff --git a/graph/incidents_graphml/c/cebf7660-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cebf7660-5b8b-11ee-9925-ebc6745d6541.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..497ceaf742d39272490c128efd3bed42b635ac23
--- /dev/null
+++ b/graph/incidents_graphml/c/cebf7660-5b8b-11ee-9925-ebc6745d6541.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.240
+ 100.64.12.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695636652
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cebf7660-5b8b-11ee-9925-ebc6745d6541
+
+
+ INCIDENT_LINK
+ 1695636652
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cebf7660-5b8b-11ee-9925-ebc6745d6541
+
+
+
diff --git a/graph/incidents_graphml/c/cec4c580-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/cec4c580-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ffff60720658368f27021b31f519719d0175fa0
--- /dev/null
+++ b/graph/incidents_graphml/c/cec4c580-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.166
+ 100.64.19.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127338
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cec4c580-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/cec528a0-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/c/cec528a0-a4a5-11ed-b478-67badd244434.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..017ca22d88fa0445122c2ae7ddcecaa9baa97b7e
--- /dev/null
+++ b/graph/incidents_graphml/c/cec528a0-a4a5-11ed-b478-67badd244434.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.90
+ HOST-16410
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.152
+ 100.64.82.152
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1675526756
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cec528a0-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526756
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cec528a0-a4a5-11ed-b478-67badd244434
+
+
+
diff --git a/graph/incidents_graphml/c/ced1ae90-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/ced1ae90-2d17-11ee-92ce-ad047e277e2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f79a924c45c84924af104d47b39993c0ffd91efc
--- /dev/null
+++ b/graph/incidents_graphml/c/ced1ae90-2d17-11ee-92ce-ad047e277e2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.124
+ 100.64.49.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690529077
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ced1ae90-2d17-11ee-92ce-ad047e277e2c
+
+
+
diff --git a/graph/incidents_graphml/c/ced2cf40-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/ced2cf40-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6e072f429fb58768b7c9018c2d6073f9531f574
--- /dev/null
+++ b/graph/incidents_graphml/c/ced2cf40-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.44
+ 100.64.40.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127338
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ced2cf40-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/ced2fe60-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/ced2fe60-5b8b-11ee-9925-ebc6745d6541.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f89c49c4ebfb45a2f20180f785a7b23e7235eb88
--- /dev/null
+++ b/graph/incidents_graphml/c/ced2fe60-5b8b-11ee-9925-ebc6745d6541.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.240
+ 100.64.12.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695636652
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ced2fe60-5b8b-11ee-9925-ebc6745d6541
+
+
+
diff --git a/graph/incidents_graphml/c/ced54900-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/c/ced54900-f6b2-11ee-b30f-810e76324c4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc2fbc12364eaaa4193036919ac341d1e5a0c8d7
--- /dev/null
+++ b/graph/incidents_graphml/c/ced54900-f6b2-11ee-b30f-810e76324c4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.204
+ 100.64.44.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712695833
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ced54900-f6b2-11ee-b30f-810e76324c4a
+
+
+
diff --git a/graph/incidents_graphml/c/cee1cab0-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cee1cab0-9536-11ed-b287-e7a585a77071.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b68ab15ead5f165c33b593a4b867765dd15a7b89
--- /dev/null
+++ b/graph/incidents_graphml/c/cee1cab0-9536-11ed-b287-e7a585a77071.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1968.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.132
+ 100.64.95.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673829815
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cee1cab0-9536-11ed-b287-e7a585a77071
+
+
+
diff --git a/graph/incidents_graphml/c/cee21990-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cee21990-5b8b-11ee-9925-ebc6745d6541.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a65c684de93b0a1cf357482c9287859edcf9956e
--- /dev/null
+++ b/graph/incidents_graphml/c/cee21990-5b8b-11ee-9925-ebc6745d6541.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.40
+ 100.64.18.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695636652
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cee21990-5b8b-11ee-9925-ebc6745d6541
+
+
+
diff --git a/graph/incidents_graphml/c/cee2f7f0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/c/cee2f7f0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e92117dd455bd094918a48e95b7ac04c6e1ca30
--- /dev/null
+++ b/graph/incidents_graphml/c/cee2f7f0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.57.68
+ 100.64.57.68
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685492798
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cee2f7f0-ff49-11ed-a0f1-e9dc61d1c5b8
+
+
+
diff --git a/graph/incidents_graphml/c/ceea8630-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/ceea8630-89bb-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02aa4b563fceae218a56a95224ec97363bfade11
--- /dev/null
+++ b/graph/incidents_graphml/c/ceea8630-89bb-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.84
+ 100.64.65.84
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700715021
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ceea8630-89bb-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/c/ceeb88c0-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/ceeb88c0-4423-11ed-8338-1b551ccaa997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..07fc1d89201030994137312f8acfff4891f6cc36
--- /dev/null
+++ b/graph/incidents_graphml/c/ceeb88c0-4423-11ed-8338-1b551ccaa997.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.47
+ 100.64.75.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1664915610
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ceeb88c0-4423-11ed-8338-1b551ccaa997
+
+
+
diff --git a/graph/incidents_graphml/c/ceeb8eb0-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/ceeb8eb0-9536-11ed-b287-e7a585a77071.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ca03a029983246e9daebaa9631e0436e2438a82
--- /dev/null
+++ b/graph/incidents_graphml/c/ceeb8eb0-9536-11ed-b287-e7a585a77071.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.132
+ 100.64.95.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673829815
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ceeb8eb0-9536-11ed-b287-e7a585a77071
+
+
+
diff --git a/graph/incidents_graphml/c/cef04a60-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cef04a60-5b8b-11ee-9925-ebc6745d6541.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f53d3fa7a40fde8d25341eccd4edd0db44261ce
--- /dev/null
+++ b/graph/incidents_graphml/c/cef04a60-5b8b-11ee-9925-ebc6745d6541.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.40
+ 100.64.18.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695636652
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cef04a60-5b8b-11ee-9925-ebc6745d6541
+
+
+
diff --git a/graph/incidents_graphml/c/cef37df0-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cef37df0-9536-11ed-b287-e7a585a77071.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16ad83ebd70700d59fe8e825e7922612243bfaaf
--- /dev/null
+++ b/graph/incidents_graphml/c/cef37df0-9536-11ed-b287-e7a585a77071.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.132
+ 100.64.95.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673829815
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cef37df0-9536-11ed-b287-e7a585a77071
+
+
+
diff --git a/graph/incidents_graphml/c/cef3b580-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/cef3b580-2d17-11ee-92ce-ad047e277e2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67a3fdbbe55bb5cf82deaa5c991dd5b0790172a4
--- /dev/null
+++ b/graph/incidents_graphml/c/cef3b580-2d17-11ee-92ce-ad047e277e2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.251
+ 100.64.18.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690529077
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cef3b580-2d17-11ee-92ce-ad047e277e2c
+
+
+
diff --git a/graph/incidents_graphml/c/cef63d10-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cef63d10-9536-11ed-b287-e7a585a77071.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f45712e4102da84042da5f4110d6453d34bce7c
--- /dev/null
+++ b/graph/incidents_graphml/c/cef63d10-9536-11ed-b287-e7a585a77071.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.71
+ 100.64.71.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1673829815
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cef63d10-9536-11ed-b287-e7a585a77071
+
+
+
diff --git a/graph/incidents_graphml/c/cefa64b0-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/cefa64b0-89bb-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e7502da2aaa007dbf727e273be42b6c2425ae15
--- /dev/null
+++ b/graph/incidents_graphml/c/cefa64b0-89bb-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.84
+ 100.64.65.84
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700715022
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ cefa64b0-89bb-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/c/cefb4620-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cefb4620-9536-11ed-b287-e7a585a77071.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..582b36aa30fe9bd5366f1edf4d8f8c2020f6137c
--- /dev/null
+++ b/graph/incidents_graphml/c/cefb4620-9536-11ed-b287-e7a585a77071.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.71.71
+ 100.64.71.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673829815
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cefb4620-9536-11ed-b287-e7a585a77071
+
+
+
diff --git a/graph/incidents_graphml/c/cefdde30-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cefdde30-9536-11ed-b287-e7a585a77071.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2988cdbc7cbd76414d575b9170f348f90cc0feea
--- /dev/null
+++ b/graph/incidents_graphml/c/cefdde30-9536-11ed-b287-e7a585a77071.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.134
+ 100.64.95.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1673829815
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cefdde30-9536-11ed-b287-e7a585a77071
+
+
+
diff --git a/graph/incidents_graphml/c/cefe9450-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/c/cefe9450-085f-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4b1331cbb02e6c2b6a2d397518cbb69b08c7874
--- /dev/null
+++ b/graph/incidents_graphml/c/cefe9450-085f-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.253
+ 100.64.53.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686491808
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cefe9450-085f-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/c/cf015560-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/c/cf015560-ff49-11ed-a0f1-e9dc61d1c5b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02df838e823c5040d60de81b2b9aeed67542a26c
--- /dev/null
+++ b/graph/incidents_graphml/c/cf015560-ff49-11ed-a0f1-e9dc61d1c5b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.70
+ 100.64.57.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685492799
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf015560-ff49-11ed-a0f1-e9dc61d1c5b8
+
+
+
diff --git a/graph/incidents_graphml/c/cf01fce0-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/c/cf01fce0-9536-11ed-b287-e7a585a77071.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..463e27fe42f0d1492c29954c6d22ca474ba1fe83
--- /dev/null
+++ b/graph/incidents_graphml/c/cf01fce0-9536-11ed-b287-e7a585a77071.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.134
+ 100.64.95.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673829815
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cf01fce0-9536-11ed-b287-e7a585a77071
+
+
+
diff --git a/graph/incidents_graphml/c/cf030860-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/cf030860-4423-11ed-8338-1b551ccaa997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98a785adcd7f16a8168eeed9e68729dd06431909
--- /dev/null
+++ b/graph/incidents_graphml/c/cf030860-4423-11ed-8338-1b551ccaa997.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.47
+ 100.64.75.47
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664915610
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cf030860-4423-11ed-8338-1b551ccaa997
+
+
+
diff --git a/graph/incidents_graphml/c/cf04dd20-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/cf04dd20-4423-11ed-8338-1b551ccaa997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05edbc0144ec2e04e482f6e88b0297f42954b9ae
--- /dev/null
+++ b/graph/incidents_graphml/c/cf04dd20-4423-11ed-8338-1b551ccaa997.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.48
+ 100.64.75.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.8
+ 100.64.74.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1664915610
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf04dd20-4423-11ed-8338-1b551ccaa997
+
+
+ INCIDENT_LINK
+ 1664915610
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf04dd20-4423-11ed-8338-1b551ccaa997
+
+
+
diff --git a/graph/incidents_graphml/c/cf071b90-10d6-11ef-8c06-93e20871a0e5.graphml b/graph/incidents_graphml/c/cf071b90-10d6-11ef-8c06-93e20871a0e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53a4417a0421bbbbb041c02befe8153f6fe3758d
--- /dev/null
+++ b/graph/incidents_graphml/c/cf071b90-10d6-11ef-8c06-93e20871a0e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.9
+ 100.64.25.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715570025
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf071b90-10d6-11ef-8c06-93e20871a0e5
+
+
+
diff --git a/graph/incidents_graphml/c/cf0bdca0-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/c/cf0bdca0-4e2d-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac6bff16b3fcd01e83c088eb124ee6e95517f288
--- /dev/null
+++ b/graph/incidents_graphml/c/cf0bdca0-4e2d-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.183
+ 100.64.30.183
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.184
+ 100.64.30.184
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.185
+ 100.64.30.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.181
+ 100.64.16.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.186
+ 100.64.30.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.187
+ 100.64.30.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.234
+ 100.64.9.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.173
+ 100.64.16.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.188
+ 100.64.30.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.136
+ 100.64.2.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.189
+ 100.64.30.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.202
+ USER-0015-1186.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.190
+ 100.64.30.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.191
+ 100.64.30.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.192
+ 100.64.30.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.193
+ 100.64.30.193
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.194
+ 100.64.30.194
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.195
+ 100.64.30.195
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.196
+ 100.64.30.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+ INCIDENT_LINK
+ 1694166915
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0bdca0-4e2d-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/c/cf0dc8f0-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cf0dc8f0-ff26-11ec-890e-b9233ab766d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad172db07ecb64a26baf2806a628f0fe847e1a49
--- /dev/null
+++ b/graph/incidents_graphml/c/cf0dc8f0-ff26-11ec-890e-b9233ab766d3.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.99
+ 100.64.36.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.92
+ 100.64.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.15.29
+ 100.64.15.29
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.125
+ 100.64.71.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.7.18
+ 100.64.7.18
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.85
+ 100.64.76.85
+ ["Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.39
+ 100.64.73.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.30.84
+ 100.64.30.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.86
+ 100.64.76.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.87
+ 100.64.76.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.88
+ 100.64.76.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.8.202
+ USER-0015-1734.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.89
+ 100.64.76.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.90
+ 100.64.76.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.91
+ 100.64.76.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.92
+ 100.64.76.92
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.240
+ 100.64.71.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.90
+ 100.64.71.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.67.59
+ 100.64.67.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ cf0dc8f0-ff26-11ec-890e-b9233ab766d3
+
+
+
diff --git a/graph/incidents_graphml/c/cf114b60-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cf114b60-ff26-11ec-890e-b9233ab766d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00e64e2e29a327d543f8a4c24c02e8c266e079eb
--- /dev/null
+++ b/graph/incidents_graphml/c/cf114b60-ff26-11ec-890e-b9233ab766d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.247
+ 100.64.74.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657330268
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ cf114b60-ff26-11ec-890e-b9233ab766d3
+
+
+
diff --git a/graph/incidents_graphml/c/cf1550a0-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/c/cf1550a0-085f-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..141919039ba3e0c10bc75acf98436640c107f0c1
--- /dev/null
+++ b/graph/incidents_graphml/c/cf1550a0-085f-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.253
+ 100.64.53.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686491808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cf1550a0-085f-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/c/cf182930-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cf182930-ff26-11ec-890e-b9233ab766d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..804e53ace494d3614292afc8d19c5a23bfd5a6a5
--- /dev/null
+++ b/graph/incidents_graphml/c/cf182930-ff26-11ec-890e-b9233ab766d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.247
+ 100.64.74.247
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657330269
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cf182930-ff26-11ec-890e-b9233ab766d3
+
+
+
diff --git a/graph/incidents_graphml/c/cf18a7c0-10d6-11ef-8c06-93e20871a0e5.graphml b/graph/incidents_graphml/c/cf18a7c0-10d6-11ef-8c06-93e20871a0e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..912cb58ec3b3fc4bbb8d5a7e5f6c063b99879eb6
--- /dev/null
+++ b/graph/incidents_graphml/c/cf18a7c0-10d6-11ef-8c06-93e20871a0e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.9
+ 100.64.25.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715570025
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cf18a7c0-10d6-11ef-8c06-93e20871a0e5
+
+
+
diff --git a/graph/incidents_graphml/c/cf1af7e0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/c/cf1af7e0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15f1794fb0f9f89e283d0b3b50eba06801c5f42e
--- /dev/null
+++ b/graph/incidents_graphml/c/cf1af7e0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.57.70
+ 100.64.57.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685492799
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cf1af7e0-ff49-11ed-a0f1-e9dc61d1c5b8
+
+
+
diff --git a/graph/incidents_graphml/c/cf240490-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cf240490-5b8b-11ee-9925-ebc6745d6541.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aec74c5d60e5bf58ff5e888be56e9e6df38d6921
--- /dev/null
+++ b/graph/incidents_graphml/c/cf240490-5b8b-11ee-9925-ebc6745d6541.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.46
+ 100.64.18.46
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695636652
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ cf240490-5b8b-11ee-9925-ebc6745d6541
+
+
+