f15hb0wn commited on
Commit
ecfd21d
·
verified ·
1 Parent(s): be8112a

Upload per-incident GraphML sharded batch 19/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/b/b3616c00-4166-11ee-89c1-af7b5492d246.graphml +63 -0
  2. graph/incidents_graphml/b/b3624cf0-0c8d-11ee-af4a-2171e1d29da4.graphml +185 -0
  3. graph/incidents_graphml/b/b3651920-45d2-11ee-b6a5-451a7dc3db0a.graphml +63 -0
  4. graph/incidents_graphml/b/b3653360-6b25-11ee-97c5-672d6deedc53.graphml +63 -0
  5. graph/incidents_graphml/b/b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml +63 -0
  6. graph/incidents_graphml/b/b36f27a0-4166-11ee-89c1-af7b5492d246.graphml +63 -0
  7. graph/incidents_graphml/b/b3763020-45d2-11ee-b6a5-451a7dc3db0a.graphml +63 -0
  8. graph/incidents_graphml/b/b37778e0-24c6-11ee-aa36-6b1924b88a3a.graphml +63 -0
  9. graph/incidents_graphml/b/b37ade40-6b25-11ee-97c5-672d6deedc53.graphml +63 -0
  10. graph/incidents_graphml/b/b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml +63 -0
  11. graph/incidents_graphml/b/b386dd50-25e6-11ee-8760-d9b0ea984292.graphml +329 -0
  12. graph/incidents_graphml/b/b38f6db0-24c6-11ee-aa36-6b1924b88a3a.graphml +63 -0
  13. graph/incidents_graphml/b/b3924530-d3d0-11ee-a6e5-2b3ad02f17a7.graphml +63 -0
  14. graph/incidents_graphml/b/b3937c20-45d2-11ee-b6a5-451a7dc3db0a.graphml +77 -0
  15. graph/incidents_graphml/b/b39b6230-3552-11ef-bea6-a94fc9e3b8ec.graphml +149 -0
  16. graph/incidents_graphml/b/b3ad1a10-efc3-11ec-9799-0176ac54cf1b.graphml +77 -0
  17. graph/incidents_graphml/b/b3b45190-14b1-11ee-abc8-e11acc1bcb26.graphml +113 -0
  18. graph/incidents_graphml/b/b3b60140-31e7-11ee-b48d-2b64d5dc7f75.graphml +63 -0
  19. graph/incidents_graphml/b/b3c18a60-4b4b-11ee-a689-9b5633a6069d.graphml +85 -0
  20. graph/incidents_graphml/b/b3c705f0-892a-11ed-9e45-31aae3dc518d.graphml +77 -0
  21. graph/incidents_graphml/b/b3d03060-4b4b-11ee-a689-9b5633a6069d.graphml +63 -0
  22. graph/incidents_graphml/b/b3d17880-31e7-11ee-b48d-2b64d5dc7f75.graphml +63 -0
  23. graph/incidents_graphml/b/b3d71530-7bd2-11ee-8fcf-9fbd42a0c461.graphml +63 -0
  24. graph/incidents_graphml/b/b3e30100-a5e0-11ee-af6c-2f69bce079e5.graphml +63 -0
  25. graph/incidents_graphml/b/b3e713c0-4b4b-11ee-a689-9b5633a6069d.graphml +63 -0
  26. graph/incidents_graphml/b/b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461.graphml +63 -0
  27. graph/incidents_graphml/b/b3ec7270-3b73-11ef-b1e4-3da31b742190.graphml +221 -0
  28. graph/incidents_graphml/b/b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75.graphml +63 -0
  29. graph/incidents_graphml/b/b3f4a850-4b4b-11ee-a689-9b5633a6069d.graphml +63 -0
  30. graph/incidents_graphml/b/b3f4d180-de41-11ed-8036-d144f5e7f2f2.graphml +725 -0
  31. graph/incidents_graphml/b/b3f7fc20-54ed-11ee-acde-a35f456e55de.graphml +63 -0
  32. graph/incidents_graphml/b/b3fca1f0-80dd-11ee-a529-e575d13068e1.graphml +63 -0
  33. graph/incidents_graphml/b/b3ffc5b0-6b25-11ee-97c5-672d6deedc53.graphml +63 -0
  34. graph/incidents_graphml/b/b4062cf0-54ed-11ee-acde-a35f456e55de.graphml +63 -0
  35. graph/incidents_graphml/b/b408cc90-4b4b-11ee-a689-9b5633a6069d.graphml +63 -0
  36. graph/incidents_graphml/b/b40f2f00-6b25-11ee-97c5-672d6deedc53.graphml +63 -0
  37. graph/incidents_graphml/b/b41186b0-076a-11ef-93a8-d78cfa287885.graphml +63 -0
  38. graph/incidents_graphml/b/b4146550-4b4b-11ee-a689-9b5633a6069d.graphml +63 -0
  39. graph/incidents_graphml/b/b4186cb0-21b9-11ee-ad82-796ed23e6009.graphml +63 -0
  40. graph/incidents_graphml/b/b41aa6f0-2800-11ed-b924-cd5cf98263a8.graphml +63 -0
  41. graph/incidents_graphml/b/b41d1050-54ed-11ee-acde-a35f456e55de.graphml +63 -0
  42. graph/incidents_graphml/b/b41ffe10-4b4b-11ee-a689-9b5633a6069d.graphml +63 -0
  43. graph/incidents_graphml/b/b4372a80-70e5-11ee-adf7-3be9df66b766.graphml +77 -0
  44. graph/incidents_graphml/b/b439c7a0-4b4b-11ee-a689-9b5633a6069d.graphml +63 -0
  45. graph/incidents_graphml/b/b4436050-be7c-11ed-9564-3d773f19984f.graphml +63 -0
  46. graph/incidents_graphml/b/b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461.graphml +63 -0
  47. graph/incidents_graphml/b/b4507610-6c8b-11ee-8c03-355f988cf3d5.graphml +63 -0
  48. graph/incidents_graphml/b/b4546070-a5e0-11ee-af6c-2f69bce079e5.graphml +63 -0
  49. graph/incidents_graphml/b/b45ab2e0-11c0-11ee-aac5-6731911fd461.graphml +149 -0
  50. graph/incidents_graphml/b/b46117e0-6c8b-11ee-8c03-355f988cf3d5.graphml +63 -0
graph/incidents_graphml/b/b3616c00-4166-11ee-89c1-af7b5492d246.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5bef6045-163b-11ee-8f1b-851c95cb19a1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.184.211.180</data>
35
+ <data key="n_hostname">10.184.211.180</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="e412f410-415f-11ee-934e-5d042676ee30">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.96.141</data>
43
+ <data key="n_hostname">100.64.96.141</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17001" target="HOST-19085">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692761984</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3616c00-4166-11ee-89c1-af7b5492d246</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3624cf0-0c8d-11ee-af4a-2171e1d29da4.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2acbd0e2-086a-11ee-a2c6-fbe4905163ba">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.29.127</data>
35
+ <data key="n_hostname">100.64.29.127</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="094cdc22-0626-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.45</data>
43
+ <data key="n_hostname">100.64.68.45</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="46d40821-076b-11ee-85d5-5dbd9f3ad183">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.30.59</data>
51
+ <data key="n_hostname">100.64.30.59</data>
52
+ <data key="n_set_roles">["Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
55
+ </node>
56
+ <node id="6b6e6633-0658-11ee-8a71-9b03b6d5ce7f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.69.56</data>
59
+ <data key="n_hostname">100.64.69.56</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <node id="0027f7c6-0625-11ee-9290-9f7f8caf087f">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.68.31</data>
67
+ <data key="n_hostname">100.64.68.31</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
71
+ </node>
72
+ <edge id="e1" source="HOST-11858" target="HOST-11424">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1686951323</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.7</data>
77
+ <data key="e_suspicion_score">0.25</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Unprocessed</data>
84
+ <data key="e_incident_id">b3624cf0-0c8d-11ee-af4a-2171e1d29da4</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-11424" target="HOST-11858">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1686951323</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.7</data>
91
+ <data key="e_suspicion_score">0.25</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Unprocessed</data>
98
+ <data key="e_incident_id">b3624cf0-0c8d-11ee-af4a-2171e1d29da4</data>
99
+ </edge>
100
+ <edge id="e3" source="HOST-11424" target="46d40821-076b-11ee-85d5-5dbd9f3ad183">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1686951323</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.7</data>
105
+ <data key="e_suspicion_score">0.25</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Unprocessed</data>
112
+ <data key="e_incident_id">b3624cf0-0c8d-11ee-af4a-2171e1d29da4</data>
113
+ </edge>
114
+ <edge id="e4" source="46d40821-076b-11ee-85d5-5dbd9f3ad183" target="HOST-11424">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1686951323</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.7</data>
119
+ <data key="e_suspicion_score">0.25</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Unprocessed</data>
126
+ <data key="e_incident_id">b3624cf0-0c8d-11ee-af4a-2171e1d29da4</data>
127
+ </edge>
128
+ <edge id="e5" source="6b6e6633-0658-11ee-8a71-9b03b6d5ce7f" target="HOST-11404">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1686951323</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.7</data>
133
+ <data key="e_suspicion_score">0.25</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Unprocessed</data>
140
+ <data key="e_incident_id">b3624cf0-0c8d-11ee-af4a-2171e1d29da4</data>
141
+ </edge>
142
+ <edge id="e6" source="HOST-11404" target="6b6e6633-0658-11ee-8a71-9b03b6d5ce7f">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1686951323</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.7</data>
147
+ <data key="e_suspicion_score">0.25</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Unprocessed</data>
154
+ <data key="e_incident_id">b3624cf0-0c8d-11ee-af4a-2171e1d29da4</data>
155
+ </edge>
156
+ <edge id="e7" source="HOST-11858" target="HOST-11404">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1686951323</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.7</data>
161
+ <data key="e_suspicion_score">0.25</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Unprocessed</data>
168
+ <data key="e_incident_id">b3624cf0-0c8d-11ee-af4a-2171e1d29da4</data>
169
+ </edge>
170
+ <edge id="e8" source="HOST-11404" target="HOST-11858">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1686951323</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.7</data>
175
+ <data key="e_suspicion_score">0.25</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Unprocessed</data>
182
+ <data key="e_incident_id">b3624cf0-0c8d-11ee-af4a-2171e1d29da4</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>
graph/incidents_graphml/b/b3651920-45d2-11ee-b6a5-451a7dc3db0a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3eb06ed2-0d57-11ee-8068-515eb2e85738">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.91.93</data>
35
+ <data key="n_hostname">USER-0015-2067.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="659f79f1-16c6-11ee-8596-b5a423e38e2e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">192.168.5.246</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="3eb06ed2-0d57-11ee-8068-515eb2e85738" target="HOST-17030">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693248175</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3651920-45d2-11ee-b6a5-451a7dc3db0a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3653360-6b25-11ee-97c5-672d6deedc53.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da93d1d3-06b2-11ee-8085-a5aa2f0fa0c4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.41.2</data>
35
+ <data key="n_hostname">100.64.41.2</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.201.119</data>
43
+ <data key="n_hostname">172.30.201.119</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="da93d1d3-06b2-11ee-8085-a5aa2f0fa0c4" target="HOST-2760">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697352016</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3653360-6b25-11ee-97c5-672d6deedc53</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="afcf3b62-a34c-11ee-b21e-ede7b6fda12d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.39</data>
35
+ <data key="n_hostname">100.64.17.39</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="afcf3b62-a34c-11ee-b21e-ede7b6fda12d" target="HOST-2821">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708860381</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b36f27a0-4166-11ee-89c1-af7b5492d246.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f8c3e3b4-415f-11ee-af2f-21e21be8201a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.96.143</data>
35
+ <data key="n_hostname">100.64.96.143</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="29c09b35-3a2a-11ee-90a0-a1349359cb18">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.221.82.8</data>
43
+ <data key="n_hostname">10.221.82.8</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="f8c3e3b4-415f-11ee-af2f-21e21be8201a" target="HOST-18105">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692761984</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b36f27a0-4166-11ee-89c1-af7b5492d246</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3763020-45d2-11ee-b6a5-451a7dc3db0a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="659f79f1-16c6-11ee-8596-b5a423e38e2e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">192.168.5.246</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="3eb06ed2-0d57-11ee-8068-515eb2e85738">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.91.93</data>
43
+ <data key="n_hostname">USER-0015-2067.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17030" target="HOST-18106">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693248175</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3763020-45d2-11ee-b6a5-451a7dc3db0a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b37778e0-24c6-11ee-aa36-6b1924b88a3a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="88e28110-062b-11ee-a7ee-5b5176d9d7ba">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.13.127</data>
35
+ <data key="n_hostname">USER-0015-1213.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.6.172</data>
43
+ <data key="n_hostname">172.31.6.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="88e28110-062b-11ee-a7ee-5b5176d9d7ba" target="HOST-2757">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689614632</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b37778e0-24c6-11ee-aa36-6b1924b88a3a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b37ade40-6b25-11ee-97c5-672d6deedc53.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="20abfbd0-0626-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.41.4</data>
43
+ <data key="n_hostname">100.64.41.4</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="20abfbd0-0626-11ee-bea9-5f52a09eb73a">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697352016</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b37ade40-6b25-11ee-97c5-672d6deedc53</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="afcf3b62-a34c-11ee-b21e-ede7b6fda12d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.17.39</data>
43
+ <data key="n_hostname">100.64.17.39</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-4083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708860381</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b386dd50-25e6-11ee-8760-d9b0ea984292.graphml ADDED
@@ -0,0 +1,329 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="dc2590b3-2061-11ee-97cb-9f6773e2e9b0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.64.215</data>
35
+ <data key="n_hostname">100.64.64.215</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="2af0c9c0-20ef-11ee-9221-c7fead440a55">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.64.216</data>
51
+ <data key="n_hostname">100.64.64.216</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="03a2dbc1-0627-11ee-a48a-ff0b3de2e266">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.28.1</data>
59
+ <data key="n_hostname">100.64.28.1</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.578125</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="0e02e6f0-25df-11ee-b476-ff5d2e30756b">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.23.195</data>
67
+ <data key="n_hostname">100.64.23.195</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="d23435c0-0810-11ee-a42a-e53fcadf7b9c">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.64.217</data>
75
+ <data key="n_hostname">100.64.64.217</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="0a331940-062d-11ee-be8b-2bb0eee2ab89">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.64.218</data>
83
+ <data key="n_hostname">100.64.64.218</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="60843680-0628-11ee-bb6d-91e4d286acbc">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.2.110</data>
91
+ <data key="n_hostname">USER-0015-1308.example.internal</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="5220f1d3-2556-11ee-87ad-9d1be63607a0">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.64.219</data>
99
+ <data key="n_hostname">100.64.64.219</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.4375</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <edge id="e1" source="dc2590b3-2061-11ee-97cb-9f6773e2e9b0" target="HOST-2750">
105
+ <data key="e_type">INCIDENT_LINK</data>
106
+ <data key="e_timestamp">1689738328</data>
107
+ <data key="e_label_binary">malicious</data>
108
+ <data key="e_label_confidence">0.841796875</data>
109
+ <data key="e_suspicion_score">0.841796875</data>
110
+ <data key="e_mo_name">Data Theft</data>
111
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
112
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
113
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
114
+ <data key="e_lifecycle_stage">complete-mission</data>
115
+ <data key="e_disposition">Disrupted</data>
116
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
117
+ </edge>
118
+ <edge id="e2" source="HOST-2750" target="dc2590b3-2061-11ee-97cb-9f6773e2e9b0">
119
+ <data key="e_type">INCIDENT_LINK</data>
120
+ <data key="e_timestamp">1689738328</data>
121
+ <data key="e_label_binary">malicious</data>
122
+ <data key="e_label_confidence">0.841796875</data>
123
+ <data key="e_suspicion_score">0.841796875</data>
124
+ <data key="e_mo_name">Data Theft</data>
125
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
126
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
127
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
128
+ <data key="e_lifecycle_stage">complete-mission</data>
129
+ <data key="e_disposition">Disrupted</data>
130
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
131
+ </edge>
132
+ <edge id="e3" source="2af0c9c0-20ef-11ee-9221-c7fead440a55" target="HOST-2750">
133
+ <data key="e_type">INCIDENT_LINK</data>
134
+ <data key="e_timestamp">1689738328</data>
135
+ <data key="e_label_binary">malicious</data>
136
+ <data key="e_label_confidence">0.841796875</data>
137
+ <data key="e_suspicion_score">0.841796875</data>
138
+ <data key="e_mo_name">Data Theft</data>
139
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
140
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
141
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
142
+ <data key="e_lifecycle_stage">complete-mission</data>
143
+ <data key="e_disposition">Disrupted</data>
144
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
145
+ </edge>
146
+ <edge id="e4" source="HOST-2750" target="2af0c9c0-20ef-11ee-9221-c7fead440a55">
147
+ <data key="e_type">INCIDENT_LINK</data>
148
+ <data key="e_timestamp">1689738328</data>
149
+ <data key="e_label_binary">malicious</data>
150
+ <data key="e_label_confidence">0.841796875</data>
151
+ <data key="e_suspicion_score">0.841796875</data>
152
+ <data key="e_mo_name">Data Theft</data>
153
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
154
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
155
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
156
+ <data key="e_lifecycle_stage">complete-mission</data>
157
+ <data key="e_disposition">Disrupted</data>
158
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
159
+ </edge>
160
+ <edge id="e5" source="HOST-6635" target="HOST-2750">
161
+ <data key="e_type">INCIDENT_LINK</data>
162
+ <data key="e_timestamp">1689738328</data>
163
+ <data key="e_label_binary">malicious</data>
164
+ <data key="e_label_confidence">0.841796875</data>
165
+ <data key="e_suspicion_score">0.841796875</data>
166
+ <data key="e_mo_name">Data Theft</data>
167
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
168
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
169
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
170
+ <data key="e_lifecycle_stage">complete-mission</data>
171
+ <data key="e_disposition">Disrupted</data>
172
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
173
+ </edge>
174
+ <edge id="e6" source="HOST-2750" target="HOST-6635">
175
+ <data key="e_type">INCIDENT_LINK</data>
176
+ <data key="e_timestamp">1689738328</data>
177
+ <data key="e_label_binary">malicious</data>
178
+ <data key="e_label_confidence">0.841796875</data>
179
+ <data key="e_suspicion_score">0.841796875</data>
180
+ <data key="e_mo_name">Data Theft</data>
181
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
182
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
183
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
184
+ <data key="e_lifecycle_stage">complete-mission</data>
185
+ <data key="e_disposition">Disrupted</data>
186
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
187
+ </edge>
188
+ <edge id="e7" source="0e02e6f0-25df-11ee-b476-ff5d2e30756b" target="HOST-2750">
189
+ <data key="e_type">INCIDENT_LINK</data>
190
+ <data key="e_timestamp">1689738328</data>
191
+ <data key="e_label_binary">malicious</data>
192
+ <data key="e_label_confidence">0.841796875</data>
193
+ <data key="e_suspicion_score">0.841796875</data>
194
+ <data key="e_mo_name">Data Theft</data>
195
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
196
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
197
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
198
+ <data key="e_lifecycle_stage">complete-mission</data>
199
+ <data key="e_disposition">Disrupted</data>
200
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
201
+ </edge>
202
+ <edge id="e8" source="HOST-2750" target="0e02e6f0-25df-11ee-b476-ff5d2e30756b">
203
+ <data key="e_type">INCIDENT_LINK</data>
204
+ <data key="e_timestamp">1689738328</data>
205
+ <data key="e_label_binary">malicious</data>
206
+ <data key="e_label_confidence">0.841796875</data>
207
+ <data key="e_suspicion_score">0.841796875</data>
208
+ <data key="e_mo_name">Data Theft</data>
209
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
210
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
211
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
212
+ <data key="e_lifecycle_stage">complete-mission</data>
213
+ <data key="e_disposition">Disrupted</data>
214
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
215
+ </edge>
216
+ <edge id="e9" source="d23435c0-0810-11ee-a42a-e53fcadf7b9c" target="HOST-2750">
217
+ <data key="e_type">INCIDENT_LINK</data>
218
+ <data key="e_timestamp">1689738328</data>
219
+ <data key="e_label_binary">malicious</data>
220
+ <data key="e_label_confidence">0.841796875</data>
221
+ <data key="e_suspicion_score">0.841796875</data>
222
+ <data key="e_mo_name">Data Theft</data>
223
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
224
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
225
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
226
+ <data key="e_lifecycle_stage">complete-mission</data>
227
+ <data key="e_disposition">Disrupted</data>
228
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
229
+ </edge>
230
+ <edge id="e10" source="HOST-2750" target="d23435c0-0810-11ee-a42a-e53fcadf7b9c">
231
+ <data key="e_type">INCIDENT_LINK</data>
232
+ <data key="e_timestamp">1689738328</data>
233
+ <data key="e_label_binary">malicious</data>
234
+ <data key="e_label_confidence">0.841796875</data>
235
+ <data key="e_suspicion_score">0.841796875</data>
236
+ <data key="e_mo_name">Data Theft</data>
237
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
238
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
239
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
240
+ <data key="e_lifecycle_stage">complete-mission</data>
241
+ <data key="e_disposition">Disrupted</data>
242
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
243
+ </edge>
244
+ <edge id="e11" source="0a331940-062d-11ee-be8b-2bb0eee2ab89" target="HOST-2750">
245
+ <data key="e_type">INCIDENT_LINK</data>
246
+ <data key="e_timestamp">1689738328</data>
247
+ <data key="e_label_binary">malicious</data>
248
+ <data key="e_label_confidence">0.841796875</data>
249
+ <data key="e_suspicion_score">0.841796875</data>
250
+ <data key="e_mo_name">Data Theft</data>
251
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
252
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
253
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
254
+ <data key="e_lifecycle_stage">complete-mission</data>
255
+ <data key="e_disposition">Disrupted</data>
256
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
257
+ </edge>
258
+ <edge id="e12" source="HOST-2750" target="0a331940-062d-11ee-be8b-2bb0eee2ab89">
259
+ <data key="e_type">INCIDENT_LINK</data>
260
+ <data key="e_timestamp">1689738328</data>
261
+ <data key="e_label_binary">malicious</data>
262
+ <data key="e_label_confidence">0.841796875</data>
263
+ <data key="e_suspicion_score">0.841796875</data>
264
+ <data key="e_mo_name">Data Theft</data>
265
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
266
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
267
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
268
+ <data key="e_lifecycle_stage">complete-mission</data>
269
+ <data key="e_disposition">Disrupted</data>
270
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
271
+ </edge>
272
+ <edge id="e13" source="60843680-0628-11ee-bb6d-91e4d286acbc" target="HOST-2750">
273
+ <data key="e_type">INCIDENT_LINK</data>
274
+ <data key="e_timestamp">1689738328</data>
275
+ <data key="e_label_binary">malicious</data>
276
+ <data key="e_label_confidence">0.841796875</data>
277
+ <data key="e_suspicion_score">0.841796875</data>
278
+ <data key="e_mo_name">Data Theft</data>
279
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
280
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
281
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
282
+ <data key="e_lifecycle_stage">complete-mission</data>
283
+ <data key="e_disposition">Disrupted</data>
284
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
285
+ </edge>
286
+ <edge id="e14" source="HOST-2750" target="60843680-0628-11ee-bb6d-91e4d286acbc">
287
+ <data key="e_type">INCIDENT_LINK</data>
288
+ <data key="e_timestamp">1689738328</data>
289
+ <data key="e_label_binary">malicious</data>
290
+ <data key="e_label_confidence">0.841796875</data>
291
+ <data key="e_suspicion_score">0.841796875</data>
292
+ <data key="e_mo_name">Data Theft</data>
293
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
294
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
295
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
296
+ <data key="e_lifecycle_stage">complete-mission</data>
297
+ <data key="e_disposition">Disrupted</data>
298
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
299
+ </edge>
300
+ <edge id="e15" source="5220f1d3-2556-11ee-87ad-9d1be63607a0" target="HOST-2750">
301
+ <data key="e_type">INCIDENT_LINK</data>
302
+ <data key="e_timestamp">1689738328</data>
303
+ <data key="e_label_binary">malicious</data>
304
+ <data key="e_label_confidence">0.841796875</data>
305
+ <data key="e_suspicion_score">0.841796875</data>
306
+ <data key="e_mo_name">Data Theft</data>
307
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
308
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
309
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
310
+ <data key="e_lifecycle_stage">complete-mission</data>
311
+ <data key="e_disposition">Disrupted</data>
312
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
313
+ </edge>
314
+ <edge id="e16" source="HOST-2750" target="5220f1d3-2556-11ee-87ad-9d1be63607a0">
315
+ <data key="e_type">INCIDENT_LINK</data>
316
+ <data key="e_timestamp">1689738328</data>
317
+ <data key="e_label_binary">malicious</data>
318
+ <data key="e_label_confidence">0.841796875</data>
319
+ <data key="e_suspicion_score">0.841796875</data>
320
+ <data key="e_mo_name">Data Theft</data>
321
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
322
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
323
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
324
+ <data key="e_lifecycle_stage">complete-mission</data>
325
+ <data key="e_disposition">Disrupted</data>
326
+ <data key="e_incident_id">b386dd50-25e6-11ee-8760-d9b0ea984292</data>
327
+ </edge>
328
+ </graph>
329
+ </graphml>
graph/incidents_graphml/b/b38f6db0-24c6-11ee-aa36-6b1924b88a3a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.6.172</data>
35
+ <data key="n_hostname">172.31.6.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="88e28110-062b-11ee-a7ee-5b5176d9d7ba">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.13.127</data>
43
+ <data key="n_hostname">USER-0015-1213.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2757" target="HOST-4093">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689614633</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b38f6db0-24c6-11ee-aa36-6b1924b88a3a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3924530-d3d0-11ee-a6e5-2b3ad02f17a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="65ff4030-545e-11ee-aab6-c96ded65841f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.41</data>
35
+ <data key="n_hostname">USER-0015-1211.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.201.119</data>
43
+ <data key="n_hostname">172.30.201.119</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="65ff4030-545e-11ee-aab6-c96ded65841f" target="HOST-2760">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708860381</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3924530-d3d0-11ee-a6e5-2b3ad02f17a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3937c20-45d2-11ee-b6a5-451a7dc3db0a.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7b5e4f50-062c-11ee-a911-81ff0b3b49e4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.134.199</data>
35
+ <data key="n_hostname">192.168.134.199</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="3ba0d3a1-3aa3-11ee-8c94-378a580b8ef5">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.91.95</data>
43
+ <data key="n_hostname">100.64.91.95</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17809" target="3ba0d3a1-3aa3-11ee-8c94-378a580b8ef5">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693248175</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.4375</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3937c20-45d2-11ee-b6a5-451a7dc3db0a</data>
61
+ </edge>
62
+ <edge id="e2" source="3ba0d3a1-3aa3-11ee-8c94-378a580b8ef5" target="HOST-17809">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1693248175</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.4375</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">b3937c20-45d2-11ee-b6a5-451a7dc3db0a</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/b/b39b6230-3552-11ef-bea6-a94fc9e3b8ec.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8d83dcb0-2901-11ef-b6be-1f2bd24d8e4a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.227.172</data>
35
+ <data key="n_hostname">USER-0015-2135.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="6eb18992-29ab-11ef-bc78-a35da916a29d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.95.152</data>
43
+ <data key="n_hostname">100.64.95.152</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="449228f3-28f6-11ef-b508-d5f28f979331">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.95.153</data>
51
+ <data key="n_hostname">100.64.95.153</data>
52
+ <data key="n_set_roles">["Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="7e258303-291e-11ef-9167-4b546e5b52be">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.89.229</data>
59
+ <data key="n_hostname">100.64.89.229</data>
60
+ <data key="n_set_roles">["Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <edge id="e1" source="HOST-18829" target="6eb18992-29ab-11ef-bc78-a35da916a29d">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1719581478</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.7</data>
69
+ <data key="e_suspicion_score">0.25</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Unprocessed</data>
76
+ <data key="e_incident_id">b39b6230-3552-11ef-bea6-a94fc9e3b8ec</data>
77
+ </edge>
78
+ <edge id="e2" source="6eb18992-29ab-11ef-bc78-a35da916a29d" target="HOST-18829">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1719581478</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.7</data>
83
+ <data key="e_suspicion_score">0.25</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Unprocessed</data>
90
+ <data key="e_incident_id">b39b6230-3552-11ef-bea6-a94fc9e3b8ec</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-18829" target="449228f3-28f6-11ef-b508-d5f28f979331">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1719581478</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.7</data>
97
+ <data key="e_suspicion_score">0.25</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Unprocessed</data>
104
+ <data key="e_incident_id">b39b6230-3552-11ef-bea6-a94fc9e3b8ec</data>
105
+ </edge>
106
+ <edge id="e4" source="449228f3-28f6-11ef-b508-d5f28f979331" target="HOST-18829">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1719581478</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.7</data>
111
+ <data key="e_suspicion_score">0.25</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Unprocessed</data>
118
+ <data key="e_incident_id">b39b6230-3552-11ef-bea6-a94fc9e3b8ec</data>
119
+ </edge>
120
+ <edge id="e5" source="HOST-18829" target="7e258303-291e-11ef-9167-4b546e5b52be">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1719581478</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.7</data>
125
+ <data key="e_suspicion_score">0.25</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Unprocessed</data>
132
+ <data key="e_incident_id">b39b6230-3552-11ef-bea6-a94fc9e3b8ec</data>
133
+ </edge>
134
+ <edge id="e6" source="7e258303-291e-11ef-9167-4b546e5b52be" target="HOST-18829">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1719581478</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.7</data>
139
+ <data key="e_suspicion_score">0.25</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Unprocessed</data>
146
+ <data key="e_incident_id">b39b6230-3552-11ef-bea6-a94fc9e3b8ec</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/b/b3ad1a10-efc3-11ec-9799-0176ac54cf1b.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2039c4b0-eb84-11ec-80a2-e18869204855">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.42</data>
35
+ <data key="n_hostname">100.64.76.42</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="db813bc0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.65</data>
43
+ <data key="n_hostname">100.64.72.65</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-14019" target="db813bc0-ea91-11ec-90c7-eff83c975df3">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655638435</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3ad1a10-efc3-11ec-9799-0176ac54cf1b</data>
61
+ </edge>
62
+ <edge id="e2" source="db813bc0-ea91-11ec-90c7-eff83c975df3" target="HOST-14019">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1655638435</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">b3ad1a10-efc3-11ec-9799-0176ac54cf1b</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/b/b3b45190-14b1-11ee-abc8-e11acc1bcb26.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0e261d03-063b-11ee-bc90-6f8d655e49e8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.1.240</data>
35
+ <data key="n_hostname">100.64.1.240</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="0229afd1-0b36-11ee-a2cf-c52f2b295059">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.79.145</data>
43
+ <data key="n_hostname">100.64.79.145</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="737e53c0-063b-11ee-9d16-b90ac473a2f2">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.57.100</data>
51
+ <data key="n_hostname">100.64.57.100</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="0e261d03-063b-11ee-bc90-6f8d655e49e8" target="0229afd1-0b36-11ee-a2cf-c52f2b295059">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1687846395</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">b3b45190-14b1-11ee-abc8-e11acc1bcb26</data>
69
+ </edge>
70
+ <edge id="e2" source="0229afd1-0b36-11ee-a2cf-c52f2b295059" target="0e261d03-063b-11ee-bc90-6f8d655e49e8">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1687846395</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">b3b45190-14b1-11ee-abc8-e11acc1bcb26</data>
83
+ </edge>
84
+ <edge id="e3" source="737e53c0-063b-11ee-9d16-b90ac473a2f2" target="0e261d03-063b-11ee-bc90-6f8d655e49e8">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1687846395</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">b3b45190-14b1-11ee-abc8-e11acc1bcb26</data>
97
+ </edge>
98
+ <edge id="e4" source="0e261d03-063b-11ee-bc90-6f8d655e49e8" target="737e53c0-063b-11ee-9d16-b90ac473a2f2">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1687846395</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">b3b45190-14b1-11ee-abc8-e11acc1bcb26</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/b/b3b60140-31e7-11ee-b48d-2b64d5dc7f75.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="51586fb3-0820-11ee-af63-a18f5c45a93f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.42.125</data>
35
+ <data key="n_hostname">100.64.42.125</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.23.117</data>
43
+ <data key="n_hostname">172.26.23.117</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-7580" target="HOST-2824">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691058171</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3b60140-31e7-11ee-b48d-2b64d5dc7f75</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3c18a60-4b4b-11ee-a689-9b5633a6069d.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8ab3e280-0627-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.4.229</data>
35
+ <data key="n_hostname">100.64.4.229</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.25.222.10</data>
51
+ <data key="n_hostname">172.25.222.10</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-2929" target="HOST-2858">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1693849900</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">b3c18a60-4b4b-11ee-a689-9b5633a6069d</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-2929" target="HOST-2768">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1693849900</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">b3c18a60-4b4b-11ee-a689-9b5633a6069d</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/b/b3c705f0-892a-11ed-9e45-31aae3dc518d.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="7a558622-0347-11ed-8ff1-67711f56d1d5">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.10.72</data>
43
+ <data key="n_hostname">100.64.10.72</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16881" target="7a558622-0347-11ed-8ff1-67711f56d1d5">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1672505201</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3c705f0-892a-11ed-9e45-31aae3dc518d</data>
61
+ </edge>
62
+ <edge id="e2" source="7a558622-0347-11ed-8ff1-67711f56d1d5" target="HOST-16881">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1672505201</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">b3c705f0-892a-11ed-9e45-31aae3dc518d</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/b/b3d03060-4b4b-11ee-a689-9b5633a6069d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.158.1</data>
35
+ <data key="n_hostname">172.29.158.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8ab3e280-0627-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.4.229</data>
43
+ <data key="n_hostname">100.64.4.229</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2858" target="HOST-2929">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693849900</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3d03060-4b4b-11ee-a689-9b5633a6069d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3d17880-31e7-11ee-b48d-2b64d5dc7f75.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.23.117</data>
35
+ <data key="n_hostname">172.26.23.117</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="51586fb3-0820-11ee-af63-a18f5c45a93f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.42.125</data>
43
+ <data key="n_hostname">100.64.42.125</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2824" target="HOST-7580">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691058172</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3d17880-31e7-11ee-b48d-2b64d5dc7f75</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3d71530-7bd2-11ee-8fcf-9fbd42a0c461.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="26251740-4807-11ee-b96e-39cc36af4586">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.39.13</data>
35
+ <data key="n_hostname">100.64.39.13</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.11.166</data>
43
+ <data key="n_hostname">172.31.11.166</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="26251740-4807-11ee-b96e-39cc36af4586" target="HOST-2711">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699185538</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3d71530-7bd2-11ee-8fcf-9fbd42a0c461</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3e30100-a5e0-11ee-af6c-2f69bce079e5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.22.127.96</data>
35
+ <data key="n_hostname">172.22.127.96</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="914e52d4-0625-11ee-87d2-5909d78e9e20">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.25.35</data>
43
+ <data key="n_hostname">100.64.25.35</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2726" target="HOST-5170">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703809500</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3e30100-a5e0-11ee-af6c-2f69bce079e5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3e713c0-4b4b-11ee-a689-9b5633a6069d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0135ed52-2f4e-11ee-836b-0f9fd7a3d764">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.49.22</data>
35
+ <data key="n_hostname">100.64.49.22</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.54.66</data>
43
+ <data key="n_hostname">172.24.54.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="0135ed52-2f4e-11ee-836b-0f9fd7a3d764" target="HOST-2745">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693849900</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3e713c0-4b4b-11ee-a689-9b5633a6069d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.11.166</data>
35
+ <data key="n_hostname">172.31.11.166</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="26251740-4807-11ee-b96e-39cc36af4586">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.39.13</data>
43
+ <data key="n_hostname">100.64.39.13</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2711" target="HOST-7069">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699185538</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3ec7270-3b73-11ef-b1e4-3da31b742190.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="702ef221-28f8-11ef-8a9d-45659198471d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.46.24</data>
35
+ <data key="n_hostname">100.64.46.24</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="84a1bff1-28fb-11ef-8a9d-45659198471d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.232.220</data>
43
+ <data key="n_hostname">172.16.232.220</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="920dad72-390e-11ef-8b47-e339e3eb9b5c">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.46.25</data>
51
+ <data key="n_hostname">100.64.46.25</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="bbf139c6-28fd-11ef-b25b-8798e0fc334e">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.32.100</data>
59
+ <data key="n_hostname">100.64.32.100</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="14d21852-39bd-11ef-918c-b753dc682d11">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.46.26</data>
67
+ <data key="n_hostname">100.64.46.26</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="0e1d2ed9-292f-11ef-8a73-43524e9c27e7">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.36.107</data>
75
+ <data key="n_hostname">100.64.36.107</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <edge id="e1" source="702ef221-28f8-11ef-8a9d-45659198471d" target="HOST-4717">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1720255359</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.7890625</data>
85
+ <data key="e_suspicion_score">0.7890625</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-4717" target="702ef221-28f8-11ef-8a9d-45659198471d">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1720255359</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.7890625</data>
99
+ <data key="e_suspicion_score">0.7890625</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
107
+ </edge>
108
+ <edge id="e3" source="920dad72-390e-11ef-8b47-e339e3eb9b5c" target="HOST-4717">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1720255359</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.7890625</data>
113
+ <data key="e_suspicion_score">0.7890625</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-4717" target="920dad72-390e-11ef-8b47-e339e3eb9b5c">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1720255359</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.7890625</data>
127
+ <data key="e_suspicion_score">0.7890625</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
135
+ </edge>
136
+ <edge id="e5" source="bbf139c6-28fd-11ef-b25b-8798e0fc334e" target="HOST-4717">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1720255359</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.7890625</data>
141
+ <data key="e_suspicion_score">0.7890625</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-4717" target="bbf139c6-28fd-11ef-b25b-8798e0fc334e">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1720255359</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.7890625</data>
155
+ <data key="e_suspicion_score">0.7890625</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
163
+ </edge>
164
+ <edge id="e7" source="14d21852-39bd-11ef-918c-b753dc682d11" target="HOST-4717">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1720255359</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.7890625</data>
169
+ <data key="e_suspicion_score">0.7890625</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-4717" target="14d21852-39bd-11ef-918c-b753dc682d11">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1720255359</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.7890625</data>
183
+ <data key="e_suspicion_score">0.7890625</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
191
+ </edge>
192
+ <edge id="e9" source="0e1d2ed9-292f-11ef-8a73-43524e9c27e7" target="HOST-4717">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1720255359</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.7890625</data>
197
+ <data key="e_suspicion_score">0.7890625</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
205
+ </edge>
206
+ <edge id="e10" source="HOST-4717" target="0e1d2ed9-292f-11ef-8a73-43524e9c27e7">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1720255359</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.7890625</data>
211
+ <data key="e_suspicion_score">0.7890625</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">b3ec7270-3b73-11ef-b1e4-3da31b742190</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/b/b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="91c1b2f1-113a-11ee-90b5-fb74508d3a0d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.20.202</data>
35
+ <data key="n_hostname">100.64.20.202</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.78.41</data>
43
+ <data key="n_hostname">172.31.78.41</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4564" target="HOST-2807">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691058172</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3f4a850-4b4b-11ee-a689-9b5633a6069d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.54.66</data>
35
+ <data key="n_hostname">172.24.54.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0135ed52-2f4e-11ee-836b-0f9fd7a3d764">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.49.22</data>
43
+ <data key="n_hostname">100.64.49.22</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2745" target="HOST-8573">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693849900</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3f4a850-4b4b-11ee-a689-9b5633a6069d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3f4d180-de41-11ed-8036-d144f5e7f2f2.graphml ADDED
@@ -0,0 +1,725 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d27461a0-9dd9-11ed-bc05-9b208b0a38d9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.16.135</data>
35
+ <data key="n_hostname">100.64.16.135</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.88134765625</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
39
+ </node>
40
+ <node id="ddb2e260-9d86-11ed-9ba1-69c845a45d44">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.1.39</data>
43
+ <data key="n_hostname">100.64.1.39</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="524895b1-beda-11ed-93a9-8102b7634ad4">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.77.180</data>
51
+ <data key="n_hostname">100.64.77.180</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
55
+ </node>
56
+ <node id="bbbd13f0-9d87-11ed-98f8-cd6642d241c0">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.12.88</data>
59
+ <data key="n_hostname">100.64.12.88</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.88134765625</data>
62
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
63
+ </node>
64
+ <node id="55536900-9d8e-11ed-9ba1-69c845a45d44">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.11.152</data>
67
+ <data key="n_hostname">100.64.11.152</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
71
+ </node>
72
+ <node id="c3111e03-9d8a-11ed-9ba1-69c845a45d44">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.1.157</data>
75
+ <data key="n_hostname">HOST-14854</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
79
+ </node>
80
+ <node id="cef166f0-9d8d-11ed-9ba1-69c845a45d44">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.72.58</data>
83
+ <data key="n_hostname">100.64.72.58</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
87
+ </node>
88
+ <node id="1e1244d0-9e41-11ed-9cf0-51612b7be790">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.78.102</data>
91
+ <data key="n_hostname">100.64.78.102</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.4375</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <node id="2b3fd631-afc7-11ed-b288-7fe3e946a41b">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.75.172</data>
99
+ <data key="n_hostname">USER-0015-1672.example.internal</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.841796875</data>
102
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
103
+ </node>
104
+ <node id="909ac160-dd40-11ed-a27b-c7ce8905efd3">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.72.104</data>
107
+ <data key="n_hostname">100.64.72.104</data>
108
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","Cisco Meraki Firewall","Meraki"]</data>
111
+ </node>
112
+ <node id="a4ccd7a2-de3e-11ed-b328-6de9ce77c739">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.78.103</data>
115
+ <data key="n_hostname">100.64.78.103</data>
116
+ <data key="n_set_roles">["Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.578125</data>
118
+ <data key="n_products">["Precinct","Meraki"]</data>
119
+ </node>
120
+ <node id="7cc24072-de3d-11ed-b328-6de9ce77c739">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.78.104</data>
123
+ <data key="n_hostname">100.64.78.104</data>
124
+ <data key="n_set_roles">["Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.578125</data>
126
+ <data key="n_products">["Precinct","Meraki"]</data>
127
+ </node>
128
+ <node id="90cd8040-9dbd-11ed-88d7-43430ca6852b">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.27.195</data>
131
+ <data key="n_hostname">100.64.27.195</data>
132
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
133
+ <data key="n_suspicion_score">0.71875</data>
134
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
135
+ </node>
136
+ <node id="57f8ead1-a0e1-11ed-801d-6788f925f443">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.72.73</data>
139
+ <data key="n_hostname">HOST-14855</data>
140
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.71875</data>
142
+ <data key="n_products">["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]</data>
143
+ </node>
144
+ <node id="e6479724-dc71-11ed-bee5-515afba6c821">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.14.192</data>
147
+ <data key="n_hostname">100.64.14.192</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.7626953125</data>
150
+ <data key="n_products">["Precinct","Meraki"]</data>
151
+ </node>
152
+ <node id="86b44e71-9d88-11ed-98f8-cd6642d241c0">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.75.181</data>
155
+ <data key="n_hostname">HOST-14580</data>
156
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
157
+ <data key="n_suspicion_score">0.71875</data>
158
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
159
+ </node>
160
+ <node id="5978fb04-9d87-11ed-98f8-cd6642d241c0">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.1.51</data>
163
+ <data key="n_hostname">HOST-14856</data>
164
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
165
+ <data key="n_suspicion_score">0.71875</data>
166
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
167
+ </node>
168
+ <node id="9b6f96f1-9d8b-11ed-98f8-cd6642d241c0">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.72.215</data>
171
+ <data key="n_hostname">100.64.72.215</data>
172
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
173
+ <data key="n_suspicion_score">0.71875</data>
174
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
175
+ </node>
176
+ <node id="889920c2-9d98-11ed-8ca6-bfaecb56e6a3">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.68.216</data>
179
+ <data key="n_hostname">100.64.68.216</data>
180
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
181
+ <data key="n_suspicion_score">0.7890625</data>
182
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
183
+ </node>
184
+ <node id="50195095-9dd3-11ed-b0ec-33c6dc2b5c99">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">100.64.78.105</data>
187
+ <data key="n_hostname">100.64.78.105</data>
188
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
189
+ <data key="n_suspicion_score">0.71875</data>
190
+ <data key="n_products">["Precinct","Meraki"]</data>
191
+ </node>
192
+ <edge id="e1" source="d27461a0-9dd9-11ed-bc05-9b208b0a38d9" target="ddb2e260-9d86-11ed-9ba1-69c845a45d44">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1681860929</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.88134765625</data>
197
+ <data key="e_suspicion_score">0.88134765625</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
205
+ </edge>
206
+ <edge id="e2" source="ddb2e260-9d86-11ed-9ba1-69c845a45d44" target="d27461a0-9dd9-11ed-bc05-9b208b0a38d9">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1681860929</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.88134765625</data>
211
+ <data key="e_suspicion_score">0.88134765625</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
219
+ </edge>
220
+ <edge id="e3" source="d27461a0-9dd9-11ed-bc05-9b208b0a38d9" target="HOST-14604">
221
+ <data key="e_type">INCIDENT_LINK</data>
222
+ <data key="e_timestamp">1681860929</data>
223
+ <data key="e_label_binary">malicious</data>
224
+ <data key="e_label_confidence">0.88134765625</data>
225
+ <data key="e_suspicion_score">0.88134765625</data>
226
+ <data key="e_mo_name">Data Theft</data>
227
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
228
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
229
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
230
+ <data key="e_lifecycle_stage">complete-mission</data>
231
+ <data key="e_disposition">Disrupted</data>
232
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
233
+ </edge>
234
+ <edge id="e4" source="HOST-14604" target="d27461a0-9dd9-11ed-bc05-9b208b0a38d9">
235
+ <data key="e_type">INCIDENT_LINK</data>
236
+ <data key="e_timestamp">1681860929</data>
237
+ <data key="e_label_binary">malicious</data>
238
+ <data key="e_label_confidence">0.88134765625</data>
239
+ <data key="e_suspicion_score">0.88134765625</data>
240
+ <data key="e_mo_name">Data Theft</data>
241
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
242
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
243
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
244
+ <data key="e_lifecycle_stage">complete-mission</data>
245
+ <data key="e_disposition">Disrupted</data>
246
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
247
+ </edge>
248
+ <edge id="e5" source="bbbd13f0-9d87-11ed-98f8-cd6642d241c0" target="ddb2e260-9d86-11ed-9ba1-69c845a45d44">
249
+ <data key="e_type">INCIDENT_LINK</data>
250
+ <data key="e_timestamp">1681860929</data>
251
+ <data key="e_label_binary">malicious</data>
252
+ <data key="e_label_confidence">0.88134765625</data>
253
+ <data key="e_suspicion_score">0.88134765625</data>
254
+ <data key="e_mo_name">Data Theft</data>
255
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
256
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
257
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
258
+ <data key="e_lifecycle_stage">complete-mission</data>
259
+ <data key="e_disposition">Disrupted</data>
260
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
261
+ </edge>
262
+ <edge id="e6" source="ddb2e260-9d86-11ed-9ba1-69c845a45d44" target="bbbd13f0-9d87-11ed-98f8-cd6642d241c0">
263
+ <data key="e_type">INCIDENT_LINK</data>
264
+ <data key="e_timestamp">1681860929</data>
265
+ <data key="e_label_binary">malicious</data>
266
+ <data key="e_label_confidence">0.88134765625</data>
267
+ <data key="e_suspicion_score">0.88134765625</data>
268
+ <data key="e_mo_name">Data Theft</data>
269
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
270
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
271
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
272
+ <data key="e_lifecycle_stage">complete-mission</data>
273
+ <data key="e_disposition">Disrupted</data>
274
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
275
+ </edge>
276
+ <edge id="e7" source="55536900-9d8e-11ed-9ba1-69c845a45d44" target="c3111e03-9d8a-11ed-9ba1-69c845a45d44">
277
+ <data key="e_type">INCIDENT_LINK</data>
278
+ <data key="e_timestamp">1681860929</data>
279
+ <data key="e_label_binary">malicious</data>
280
+ <data key="e_label_confidence">0.88134765625</data>
281
+ <data key="e_suspicion_score">0.88134765625</data>
282
+ <data key="e_mo_name">Data Theft</data>
283
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
284
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
285
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
286
+ <data key="e_lifecycle_stage">complete-mission</data>
287
+ <data key="e_disposition">Disrupted</data>
288
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
289
+ </edge>
290
+ <edge id="e8" source="c3111e03-9d8a-11ed-9ba1-69c845a45d44" target="55536900-9d8e-11ed-9ba1-69c845a45d44">
291
+ <data key="e_type">INCIDENT_LINK</data>
292
+ <data key="e_timestamp">1681860929</data>
293
+ <data key="e_label_binary">malicious</data>
294
+ <data key="e_label_confidence">0.88134765625</data>
295
+ <data key="e_suspicion_score">0.88134765625</data>
296
+ <data key="e_mo_name">Data Theft</data>
297
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
298
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
299
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
300
+ <data key="e_lifecycle_stage">complete-mission</data>
301
+ <data key="e_disposition">Disrupted</data>
302
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
303
+ </edge>
304
+ <edge id="e9" source="bbbd13f0-9d87-11ed-98f8-cd6642d241c0" target="c3111e03-9d8a-11ed-9ba1-69c845a45d44">
305
+ <data key="e_type">INCIDENT_LINK</data>
306
+ <data key="e_timestamp">1681860929</data>
307
+ <data key="e_label_binary">malicious</data>
308
+ <data key="e_label_confidence">0.88134765625</data>
309
+ <data key="e_suspicion_score">0.88134765625</data>
310
+ <data key="e_mo_name">Data Theft</data>
311
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
312
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
313
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
314
+ <data key="e_lifecycle_stage">complete-mission</data>
315
+ <data key="e_disposition">Disrupted</data>
316
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
317
+ </edge>
318
+ <edge id="e10" source="c3111e03-9d8a-11ed-9ba1-69c845a45d44" target="bbbd13f0-9d87-11ed-98f8-cd6642d241c0">
319
+ <data key="e_type">INCIDENT_LINK</data>
320
+ <data key="e_timestamp">1681860929</data>
321
+ <data key="e_label_binary">malicious</data>
322
+ <data key="e_label_confidence">0.88134765625</data>
323
+ <data key="e_suspicion_score">0.88134765625</data>
324
+ <data key="e_mo_name">Data Theft</data>
325
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
326
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
327
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
328
+ <data key="e_lifecycle_stage">complete-mission</data>
329
+ <data key="e_disposition">Disrupted</data>
330
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
331
+ </edge>
332
+ <edge id="e11" source="d27461a0-9dd9-11ed-bc05-9b208b0a38d9" target="HOST-12831">
333
+ <data key="e_type">INCIDENT_LINK</data>
334
+ <data key="e_timestamp">1681860929</data>
335
+ <data key="e_label_binary">malicious</data>
336
+ <data key="e_label_confidence">0.88134765625</data>
337
+ <data key="e_suspicion_score">0.88134765625</data>
338
+ <data key="e_mo_name">Data Theft</data>
339
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
340
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
341
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
342
+ <data key="e_lifecycle_stage">complete-mission</data>
343
+ <data key="e_disposition">Disrupted</data>
344
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
345
+ </edge>
346
+ <edge id="e12" source="HOST-12831" target="d27461a0-9dd9-11ed-bc05-9b208b0a38d9">
347
+ <data key="e_type">INCIDENT_LINK</data>
348
+ <data key="e_timestamp">1681860929</data>
349
+ <data key="e_label_binary">malicious</data>
350
+ <data key="e_label_confidence">0.88134765625</data>
351
+ <data key="e_suspicion_score">0.88134765625</data>
352
+ <data key="e_mo_name">Data Theft</data>
353
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
354
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
355
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
356
+ <data key="e_lifecycle_stage">complete-mission</data>
357
+ <data key="e_disposition">Disrupted</data>
358
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
359
+ </edge>
360
+ <edge id="e13" source="1e1244d0-9e41-11ed-9cf0-51612b7be790" target="HOST-13566">
361
+ <data key="e_type">INCIDENT_LINK</data>
362
+ <data key="e_timestamp">1681860929</data>
363
+ <data key="e_label_binary">malicious</data>
364
+ <data key="e_label_confidence">0.88134765625</data>
365
+ <data key="e_suspicion_score">0.88134765625</data>
366
+ <data key="e_mo_name">Data Theft</data>
367
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
368
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
369
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
370
+ <data key="e_lifecycle_stage">complete-mission</data>
371
+ <data key="e_disposition">Disrupted</data>
372
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
373
+ </edge>
374
+ <edge id="e14" source="HOST-13566" target="1e1244d0-9e41-11ed-9cf0-51612b7be790">
375
+ <data key="e_type">INCIDENT_LINK</data>
376
+ <data key="e_timestamp">1681860929</data>
377
+ <data key="e_label_binary">malicious</data>
378
+ <data key="e_label_confidence">0.88134765625</data>
379
+ <data key="e_suspicion_score">0.88134765625</data>
380
+ <data key="e_mo_name">Data Theft</data>
381
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
382
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
383
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
384
+ <data key="e_lifecycle_stage">complete-mission</data>
385
+ <data key="e_disposition">Disrupted</data>
386
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
387
+ </edge>
388
+ <edge id="e15" source="d27461a0-9dd9-11ed-bc05-9b208b0a38d9" target="HOST-13566">
389
+ <data key="e_type">INCIDENT_LINK</data>
390
+ <data key="e_timestamp">1681860929</data>
391
+ <data key="e_label_binary">malicious</data>
392
+ <data key="e_label_confidence">0.88134765625</data>
393
+ <data key="e_suspicion_score">0.88134765625</data>
394
+ <data key="e_mo_name">Data Theft</data>
395
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
396
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
397
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
398
+ <data key="e_lifecycle_stage">complete-mission</data>
399
+ <data key="e_disposition">Disrupted</data>
400
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
401
+ </edge>
402
+ <edge id="e16" source="HOST-13566" target="d27461a0-9dd9-11ed-bc05-9b208b0a38d9">
403
+ <data key="e_type">INCIDENT_LINK</data>
404
+ <data key="e_timestamp">1681860929</data>
405
+ <data key="e_label_binary">malicious</data>
406
+ <data key="e_label_confidence">0.88134765625</data>
407
+ <data key="e_suspicion_score">0.88134765625</data>
408
+ <data key="e_mo_name">Data Theft</data>
409
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
410
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
411
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
412
+ <data key="e_lifecycle_stage">complete-mission</data>
413
+ <data key="e_disposition">Disrupted</data>
414
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
415
+ </edge>
416
+ <edge id="e17" source="bbbd13f0-9d87-11ed-98f8-cd6642d241c0" target="909ac160-dd40-11ed-a27b-c7ce8905efd3">
417
+ <data key="e_type">INCIDENT_LINK</data>
418
+ <data key="e_timestamp">1681860929</data>
419
+ <data key="e_label_binary">malicious</data>
420
+ <data key="e_label_confidence">0.88134765625</data>
421
+ <data key="e_suspicion_score">0.88134765625</data>
422
+ <data key="e_mo_name">Data Theft</data>
423
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
424
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
425
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
426
+ <data key="e_lifecycle_stage">complete-mission</data>
427
+ <data key="e_disposition">Disrupted</data>
428
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
429
+ </edge>
430
+ <edge id="e18" source="909ac160-dd40-11ed-a27b-c7ce8905efd3" target="bbbd13f0-9d87-11ed-98f8-cd6642d241c0">
431
+ <data key="e_type">INCIDENT_LINK</data>
432
+ <data key="e_timestamp">1681860929</data>
433
+ <data key="e_label_binary">malicious</data>
434
+ <data key="e_label_confidence">0.88134765625</data>
435
+ <data key="e_suspicion_score">0.88134765625</data>
436
+ <data key="e_mo_name">Data Theft</data>
437
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
438
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
439
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
440
+ <data key="e_lifecycle_stage">complete-mission</data>
441
+ <data key="e_disposition">Disrupted</data>
442
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
443
+ </edge>
444
+ <edge id="e19" source="a4ccd7a2-de3e-11ed-b328-6de9ce77c739" target="HOST-14604">
445
+ <data key="e_type">INCIDENT_LINK</data>
446
+ <data key="e_timestamp">1681860929</data>
447
+ <data key="e_label_binary">malicious</data>
448
+ <data key="e_label_confidence">0.88134765625</data>
449
+ <data key="e_suspicion_score">0.88134765625</data>
450
+ <data key="e_mo_name">Data Theft</data>
451
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
452
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
453
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
454
+ <data key="e_lifecycle_stage">complete-mission</data>
455
+ <data key="e_disposition">Disrupted</data>
456
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
457
+ </edge>
458
+ <edge id="e20" source="HOST-14604" target="a4ccd7a2-de3e-11ed-b328-6de9ce77c739">
459
+ <data key="e_type">INCIDENT_LINK</data>
460
+ <data key="e_timestamp">1681860929</data>
461
+ <data key="e_label_binary">malicious</data>
462
+ <data key="e_label_confidence">0.88134765625</data>
463
+ <data key="e_suspicion_score">0.88134765625</data>
464
+ <data key="e_mo_name">Data Theft</data>
465
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
466
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
467
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
468
+ <data key="e_lifecycle_stage">complete-mission</data>
469
+ <data key="e_disposition">Disrupted</data>
470
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
471
+ </edge>
472
+ <edge id="e21" source="7cc24072-de3d-11ed-b328-6de9ce77c739" target="909ac160-dd40-11ed-a27b-c7ce8905efd3">
473
+ <data key="e_type">INCIDENT_LINK</data>
474
+ <data key="e_timestamp">1681860929</data>
475
+ <data key="e_label_binary">malicious</data>
476
+ <data key="e_label_confidence">0.88134765625</data>
477
+ <data key="e_suspicion_score">0.88134765625</data>
478
+ <data key="e_mo_name">Data Theft</data>
479
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
480
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
481
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
482
+ <data key="e_lifecycle_stage">complete-mission</data>
483
+ <data key="e_disposition">Disrupted</data>
484
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
485
+ </edge>
486
+ <edge id="e22" source="909ac160-dd40-11ed-a27b-c7ce8905efd3" target="7cc24072-de3d-11ed-b328-6de9ce77c739">
487
+ <data key="e_type">INCIDENT_LINK</data>
488
+ <data key="e_timestamp">1681860929</data>
489
+ <data key="e_label_binary">malicious</data>
490
+ <data key="e_label_confidence">0.88134765625</data>
491
+ <data key="e_suspicion_score">0.88134765625</data>
492
+ <data key="e_mo_name">Data Theft</data>
493
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
494
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
495
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
496
+ <data key="e_lifecycle_stage">complete-mission</data>
497
+ <data key="e_disposition">Disrupted</data>
498
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
499
+ </edge>
500
+ <edge id="e23" source="90cd8040-9dbd-11ed-88d7-43430ca6852b" target="57f8ead1-a0e1-11ed-801d-6788f925f443">
501
+ <data key="e_type">INCIDENT_LINK</data>
502
+ <data key="e_timestamp">1681860929</data>
503
+ <data key="e_label_binary">malicious</data>
504
+ <data key="e_label_confidence">0.88134765625</data>
505
+ <data key="e_suspicion_score">0.88134765625</data>
506
+ <data key="e_mo_name">Data Theft</data>
507
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
508
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
509
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
510
+ <data key="e_lifecycle_stage">complete-mission</data>
511
+ <data key="e_disposition">Disrupted</data>
512
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
513
+ </edge>
514
+ <edge id="e24" source="57f8ead1-a0e1-11ed-801d-6788f925f443" target="90cd8040-9dbd-11ed-88d7-43430ca6852b">
515
+ <data key="e_type">INCIDENT_LINK</data>
516
+ <data key="e_timestamp">1681860929</data>
517
+ <data key="e_label_binary">malicious</data>
518
+ <data key="e_label_confidence">0.88134765625</data>
519
+ <data key="e_suspicion_score">0.88134765625</data>
520
+ <data key="e_mo_name">Data Theft</data>
521
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
522
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
523
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
524
+ <data key="e_lifecycle_stage">complete-mission</data>
525
+ <data key="e_disposition">Disrupted</data>
526
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
527
+ </edge>
528
+ <edge id="e25" source="e6479724-dc71-11ed-bee5-515afba6c821" target="57f8ead1-a0e1-11ed-801d-6788f925f443">
529
+ <data key="e_type">INCIDENT_LINK</data>
530
+ <data key="e_timestamp">1681860929</data>
531
+ <data key="e_label_binary">malicious</data>
532
+ <data key="e_label_confidence">0.88134765625</data>
533
+ <data key="e_suspicion_score">0.88134765625</data>
534
+ <data key="e_mo_name">Data Theft</data>
535
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
536
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
537
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
538
+ <data key="e_lifecycle_stage">complete-mission</data>
539
+ <data key="e_disposition">Disrupted</data>
540
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
541
+ </edge>
542
+ <edge id="e26" source="57f8ead1-a0e1-11ed-801d-6788f925f443" target="e6479724-dc71-11ed-bee5-515afba6c821">
543
+ <data key="e_type">INCIDENT_LINK</data>
544
+ <data key="e_timestamp">1681860929</data>
545
+ <data key="e_label_binary">malicious</data>
546
+ <data key="e_label_confidence">0.88134765625</data>
547
+ <data key="e_suspicion_score">0.88134765625</data>
548
+ <data key="e_mo_name">Data Theft</data>
549
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
550
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
551
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
552
+ <data key="e_lifecycle_stage">complete-mission</data>
553
+ <data key="e_disposition">Disrupted</data>
554
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
555
+ </edge>
556
+ <edge id="e27" source="e6479724-dc71-11ed-bee5-515afba6c821" target="HOST-14582">
557
+ <data key="e_type">INCIDENT_LINK</data>
558
+ <data key="e_timestamp">1681860929</data>
559
+ <data key="e_label_binary">malicious</data>
560
+ <data key="e_label_confidence">0.88134765625</data>
561
+ <data key="e_suspicion_score">0.88134765625</data>
562
+ <data key="e_mo_name">Data Theft</data>
563
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
564
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
565
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
566
+ <data key="e_lifecycle_stage">complete-mission</data>
567
+ <data key="e_disposition">Disrupted</data>
568
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
569
+ </edge>
570
+ <edge id="e28" source="HOST-14582" target="e6479724-dc71-11ed-bee5-515afba6c821">
571
+ <data key="e_type">INCIDENT_LINK</data>
572
+ <data key="e_timestamp">1681860929</data>
573
+ <data key="e_label_binary">malicious</data>
574
+ <data key="e_label_confidence">0.88134765625</data>
575
+ <data key="e_suspicion_score">0.88134765625</data>
576
+ <data key="e_mo_name">Data Theft</data>
577
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
578
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
579
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
580
+ <data key="e_lifecycle_stage">complete-mission</data>
581
+ <data key="e_disposition">Disrupted</data>
582
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
583
+ </edge>
584
+ <edge id="e29" source="e6479724-dc71-11ed-bee5-515afba6c821" target="5978fb04-9d87-11ed-98f8-cd6642d241c0">
585
+ <data key="e_type">INCIDENT_LINK</data>
586
+ <data key="e_timestamp">1681860929</data>
587
+ <data key="e_label_binary">malicious</data>
588
+ <data key="e_label_confidence">0.88134765625</data>
589
+ <data key="e_suspicion_score">0.88134765625</data>
590
+ <data key="e_mo_name">Data Theft</data>
591
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
592
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
593
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
594
+ <data key="e_lifecycle_stage">complete-mission</data>
595
+ <data key="e_disposition">Disrupted</data>
596
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
597
+ </edge>
598
+ <edge id="e30" source="5978fb04-9d87-11ed-98f8-cd6642d241c0" target="e6479724-dc71-11ed-bee5-515afba6c821">
599
+ <data key="e_type">INCIDENT_LINK</data>
600
+ <data key="e_timestamp">1681860929</data>
601
+ <data key="e_label_binary">malicious</data>
602
+ <data key="e_label_confidence">0.88134765625</data>
603
+ <data key="e_suspicion_score">0.88134765625</data>
604
+ <data key="e_mo_name">Data Theft</data>
605
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
606
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
607
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
608
+ <data key="e_lifecycle_stage">complete-mission</data>
609
+ <data key="e_disposition">Disrupted</data>
610
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
611
+ </edge>
612
+ <edge id="e31" source="e6479724-dc71-11ed-bee5-515afba6c821" target="HOST-13731">
613
+ <data key="e_type">INCIDENT_LINK</data>
614
+ <data key="e_timestamp">1681860929</data>
615
+ <data key="e_label_binary">malicious</data>
616
+ <data key="e_label_confidence">0.88134765625</data>
617
+ <data key="e_suspicion_score">0.88134765625</data>
618
+ <data key="e_mo_name">Data Theft</data>
619
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
620
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
621
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
622
+ <data key="e_lifecycle_stage">complete-mission</data>
623
+ <data key="e_disposition">Disrupted</data>
624
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
625
+ </edge>
626
+ <edge id="e32" source="HOST-13731" target="e6479724-dc71-11ed-bee5-515afba6c821">
627
+ <data key="e_type">INCIDENT_LINK</data>
628
+ <data key="e_timestamp">1681860929</data>
629
+ <data key="e_label_binary">malicious</data>
630
+ <data key="e_label_confidence">0.88134765625</data>
631
+ <data key="e_suspicion_score">0.88134765625</data>
632
+ <data key="e_mo_name">Data Theft</data>
633
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
634
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
635
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
636
+ <data key="e_lifecycle_stage">complete-mission</data>
637
+ <data key="e_disposition">Disrupted</data>
638
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
639
+ </edge>
640
+ <edge id="e33" source="bbbd13f0-9d87-11ed-98f8-cd6642d241c0" target="HOST-13731">
641
+ <data key="e_type">INCIDENT_LINK</data>
642
+ <data key="e_timestamp">1681860929</data>
643
+ <data key="e_label_binary">malicious</data>
644
+ <data key="e_label_confidence">0.88134765625</data>
645
+ <data key="e_suspicion_score">0.88134765625</data>
646
+ <data key="e_mo_name">Data Theft</data>
647
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
648
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
649
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
650
+ <data key="e_lifecycle_stage">complete-mission</data>
651
+ <data key="e_disposition">Disrupted</data>
652
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
653
+ </edge>
654
+ <edge id="e34" source="HOST-13731" target="bbbd13f0-9d87-11ed-98f8-cd6642d241c0">
655
+ <data key="e_type">INCIDENT_LINK</data>
656
+ <data key="e_timestamp">1681860929</data>
657
+ <data key="e_label_binary">malicious</data>
658
+ <data key="e_label_confidence">0.88134765625</data>
659
+ <data key="e_suspicion_score">0.88134765625</data>
660
+ <data key="e_mo_name">Data Theft</data>
661
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
662
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
663
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
664
+ <data key="e_lifecycle_stage">complete-mission</data>
665
+ <data key="e_disposition">Disrupted</data>
666
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
667
+ </edge>
668
+ <edge id="e35" source="889920c2-9d98-11ed-8ca6-bfaecb56e6a3" target="HOST-13566">
669
+ <data key="e_type">INCIDENT_LINK</data>
670
+ <data key="e_timestamp">1681860929</data>
671
+ <data key="e_label_binary">malicious</data>
672
+ <data key="e_label_confidence">0.88134765625</data>
673
+ <data key="e_suspicion_score">0.88134765625</data>
674
+ <data key="e_mo_name">Data Theft</data>
675
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
676
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
677
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
678
+ <data key="e_lifecycle_stage">complete-mission</data>
679
+ <data key="e_disposition">Disrupted</data>
680
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
681
+ </edge>
682
+ <edge id="e36" source="HOST-13566" target="889920c2-9d98-11ed-8ca6-bfaecb56e6a3">
683
+ <data key="e_type">INCIDENT_LINK</data>
684
+ <data key="e_timestamp">1681860929</data>
685
+ <data key="e_label_binary">malicious</data>
686
+ <data key="e_label_confidence">0.88134765625</data>
687
+ <data key="e_suspicion_score">0.88134765625</data>
688
+ <data key="e_mo_name">Data Theft</data>
689
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
690
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
691
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
692
+ <data key="e_lifecycle_stage">complete-mission</data>
693
+ <data key="e_disposition">Disrupted</data>
694
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
695
+ </edge>
696
+ <edge id="e37" source="50195095-9dd3-11ed-b0ec-33c6dc2b5c99" target="HOST-14582">
697
+ <data key="e_type">INCIDENT_LINK</data>
698
+ <data key="e_timestamp">1681860929</data>
699
+ <data key="e_label_binary">malicious</data>
700
+ <data key="e_label_confidence">0.88134765625</data>
701
+ <data key="e_suspicion_score">0.88134765625</data>
702
+ <data key="e_mo_name">Data Theft</data>
703
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
704
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
705
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
706
+ <data key="e_lifecycle_stage">complete-mission</data>
707
+ <data key="e_disposition">Disrupted</data>
708
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
709
+ </edge>
710
+ <edge id="e38" source="HOST-14582" target="50195095-9dd3-11ed-b0ec-33c6dc2b5c99">
711
+ <data key="e_type">INCIDENT_LINK</data>
712
+ <data key="e_timestamp">1681860929</data>
713
+ <data key="e_label_binary">malicious</data>
714
+ <data key="e_label_confidence">0.88134765625</data>
715
+ <data key="e_suspicion_score">0.88134765625</data>
716
+ <data key="e_mo_name">Data Theft</data>
717
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
718
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
719
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
720
+ <data key="e_lifecycle_stage">complete-mission</data>
721
+ <data key="e_disposition">Disrupted</data>
722
+ <data key="e_incident_id">b3f4d180-de41-11ed-8036-d144f5e7f2f2</data>
723
+ </edge>
724
+ </graph>
725
+ </graphml>
graph/incidents_graphml/b/b3f7fc20-54ed-11ee-acde-a35f456e55de.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2e860d62-0633-11ee-913f-7d6ad5501471">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.26.201</data>
43
+ <data key="n_hostname">100.64.26.201</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-5417">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694909039</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3f7fc20-54ed-11ee-acde-a35f456e55de</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3fca1f0-80dd-11ee-a529-e575d13068e1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.117.12.163</data>
35
+ <data key="n_hostname">10.117.12.163</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a7aabb62-3a21-11ee-a610-1beac341fae7">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.186</data>
43
+ <data key="n_hostname">100.64.8.186</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2773" target="HOST-2936">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699740019</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b3fca1f0-80dd-11ee-a529-e575d13068e1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b3ffc5b0-6b25-11ee-97c5-672d6deedc53.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="92355aa5-0629-11ee-9792-13ac4ddb104c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.41.6</data>
35
+ <data key="n_hostname">100.64.41.6</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.168.48</data>
43
+ <data key="n_hostname">172.30.168.48</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="92355aa5-0629-11ee-9792-13ac4ddb104c" target="HOST-2842">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697352017</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b3ffc5b0-6b25-11ee-97c5-672d6deedc53</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b4062cf0-54ed-11ee-acde-a35f456e55de.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="645cc7b0-0626-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.43.16</data>
35
+ <data key="n_hostname">100.64.43.16</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.208.219</data>
43
+ <data key="n_hostname">172.30.208.219</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="645cc7b0-0626-11ee-9a0c-b9f8978d847e" target="HOST-2823">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694909040</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b4062cf0-54ed-11ee-acde-a35f456e55de</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b408cc90-4b4b-11ee-a689-9b5633a6069d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="3e9f8e52-2e66-11ee-8048-e1f7ce2ab97a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.9.148</data>
43
+ <data key="n_hostname">100.64.9.148</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="HOST-3047">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693849901</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b408cc90-4b4b-11ee-a689-9b5633a6069d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b40f2f00-6b25-11ee-97c5-672d6deedc53.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="92355aa5-0629-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.41.6</data>
43
+ <data key="n_hostname">100.64.41.6</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="HOST-7352">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697352017</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b40f2f00-6b25-11ee-97c5-672d6deedc53</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b41186b0-076a-11ef-93a8-d78cfa287885.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a155f734-0f50-11ee-b664-af916da16b83">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.65.68</data>
35
+ <data key="n_hostname">100.64.65.68</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="589b8491-104c-11ee-bd12-05689cf440e1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.184.211.180</data>
43
+ <data key="n_hostname">10.184.211.180</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]</data>
47
+ </node>
48
+ <edge id="e1" source="a155f734-0f50-11ee-b664-af916da16b83" target="HOST-17315">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714534034</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b41186b0-076a-11ef-93a8-d78cfa287885</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b4146550-4b4b-11ee-a689-9b5633a6069d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9f558fe0-0627-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.14.226</data>
35
+ <data key="n_hostname">100.64.14.226</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.40.149</data>
43
+ <data key="n_hostname">172.29.40.149</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3765" target="HOST-2834">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693849901</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b4146550-4b4b-11ee-a689-9b5633a6069d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b4186cb0-21b9-11ee-ad82-796ed23e6009.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="baeb1836-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.9.43</data>
35
+ <data key="n_hostname">USER-0015-1244.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.23.117</data>
43
+ <data key="n_hostname">172.26.23.117</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="baeb1836-0625-11ee-bea9-5f52a09eb73a" target="HOST-2824">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689279197</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b4186cb0-21b9-11ee-ad82-796ed23e6009</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b41aa6f0-2800-11ed-b924-cd5cf98263a8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="dc122aa3-1ce5-11ed-926c-ddcdb109c78f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="5fa230a0-052f-11ed-b32f-8d2898be5483">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.80.157</data>
43
+ <data key="n_hostname">100.64.80.157</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16897" target="5fa230a0-052f-11ed-b32f-8d2898be5483">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1661821900</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b41aa6f0-2800-11ed-b924-cd5cf98263a8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b41d1050-54ed-11ee-acde-a35f456e55de.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.208.219</data>
35
+ <data key="n_hostname">172.30.208.219</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="645cc7b0-0626-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.43.16</data>
43
+ <data key="n_hostname">100.64.43.16</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2823" target="HOST-7662">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694909040</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b41d1050-54ed-11ee-acde-a35f456e55de</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b41ffe10-4b4b-11ee-a689-9b5633a6069d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.40.149</data>
35
+ <data key="n_hostname">172.29.40.149</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f558fe0-0627-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.14.226</data>
43
+ <data key="n_hostname">100.64.14.226</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2834" target="HOST-3765">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693849901</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b41ffe10-4b4b-11ee-a689-9b5633a6069d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b4372a80-70e5-11ee-adf7-3be9df66b766.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b6c63348-70b8-11ee-ae24-e75b356ab9c4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.76</data>
35
+ <data key="n_hostname">100.64.68.76</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="1c04b057-0625-11ee-b3ca-a7be26d46ce3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.53</data>
43
+ <data key="n_hostname">100.64.68.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="b6c63348-70b8-11ee-ae24-e75b356ab9c4" target="HOST-11433">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697984236</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b4372a80-70e5-11ee-adf7-3be9df66b766</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11433" target="b6c63348-70b8-11ee-ae24-e75b356ab9c4">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1697984236</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">b4372a80-70e5-11ee-adf7-3be9df66b766</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/b/b439c7a0-4b4b-11ee-a689-9b5633a6069d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="cd7a8100-4808-11ee-8646-4b36f2a206bb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.29</data>
43
+ <data key="n_hostname">100.64.12.29</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-3376">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693849901</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b439c7a0-4b4b-11ee-a689-9b5633a6069d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b4436050-be7c-11ed-9564-3d773f19984f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2a422704-aabe-11ed-ad78-0d50fdff7d5f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.221.82.8</data>
35
+ <data key="n_hostname">10.221.82.8</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="caa3f813-9d88-11ed-a0d9-bbd531499cbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.29.5</data>
43
+ <data key="n_hostname">100.64.29.5</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16909" target="caa3f813-9d88-11ed-a0d9-bbd531499cbc">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1678367832</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b4436050-be7c-11ed-9564-3d773f19984f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.233.43</data>
35
+ <data key="n_hostname">172.16.233.43</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="feb05526-2750-11ee-a48b-8dcaf889c643">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.193</data>
43
+ <data key="n_hostname">100.64.12.193</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2758" target="HOST-3455">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699185539</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b4507610-6c8b-11ee-8c03-355f988cf3d5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8b19d370-062b-11ee-9408-e16e7263f594">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.56.155</data>
35
+ <data key="n_hostname">100.64.56.155</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.168.229</data>
43
+ <data key="n_hostname">172.23.168.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="8b19d370-062b-11ee-9408-e16e7263f594" target="HOST-2865">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697505777</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b4507610-6c8b-11ee-8c03-355f988cf3d5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b4546070-a5e0-11ee-af6c-2f69bce079e5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="01a20d40-0628-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.243</data>
35
+ <data key="n_hostname">100.64.18.243</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.182.227</data>
43
+ <data key="n_hostname">172.31.182.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4322" target="HOST-2761">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703809501</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">b4546070-a5e0-11ee-af6c-2f69bce079e5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/b45ab2e0-11c0-11ee-aac5-6731911fd461.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bcfb2b21-0633-11ee-9ada-07a7b4e16baa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.12.228</data>
35
+ <data key="n_hostname">100.64.12.228</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="80bd4ce0-063f-11ee-b9b4-1df13e061f14">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.74.217</data>
43
+ <data key="n_hostname">100.64.74.217</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="8cdfc732-0fbf-11ee-8134-0912ec617398">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.82.109</data>
51
+ <data key="n_hostname">100.64.82.109</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="81dbef60-0657-11ee-99f7-cbfe8c12de8e">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.73.219</data>
59
+ <data key="n_hostname">100.64.73.219</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
63
+ </node>
64
+ <edge id="e1" source="bcfb2b21-0633-11ee-9ada-07a7b4e16baa" target="80bd4ce0-063f-11ee-b9b4-1df13e061f14">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1687522985</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.71875</data>
69
+ <data key="e_suspicion_score">0.71875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">b45ab2e0-11c0-11ee-aac5-6731911fd461</data>
77
+ </edge>
78
+ <edge id="e2" source="80bd4ce0-063f-11ee-b9b4-1df13e061f14" target="bcfb2b21-0633-11ee-9ada-07a7b4e16baa">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1687522985</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.71875</data>
83
+ <data key="e_suspicion_score">0.71875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">b45ab2e0-11c0-11ee-aac5-6731911fd461</data>
91
+ </edge>
92
+ <edge id="e3" source="8cdfc732-0fbf-11ee-8134-0912ec617398" target="80bd4ce0-063f-11ee-b9b4-1df13e061f14">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1687522985</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.71875</data>
97
+ <data key="e_suspicion_score">0.71875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">b45ab2e0-11c0-11ee-aac5-6731911fd461</data>
105
+ </edge>
106
+ <edge id="e4" source="80bd4ce0-063f-11ee-b9b4-1df13e061f14" target="8cdfc732-0fbf-11ee-8134-0912ec617398">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1687522985</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.71875</data>
111
+ <data key="e_suspicion_score">0.71875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">b45ab2e0-11c0-11ee-aac5-6731911fd461</data>
119
+ </edge>
120
+ <edge id="e5" source="8cdfc732-0fbf-11ee-8134-0912ec617398" target="HOST-13391">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1687522985</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.71875</data>
125
+ <data key="e_suspicion_score">0.71875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">b45ab2e0-11c0-11ee-aac5-6731911fd461</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-13391" target="8cdfc732-0fbf-11ee-8134-0912ec617398">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1687522985</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.71875</data>
139
+ <data key="e_suspicion_score">0.71875</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">b45ab2e0-11c0-11ee-aac5-6731911fd461</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/b/b46117e0-6c8b-11ee-8c03-355f988cf3d5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.168.229</data>
35
+ <data key="n_hostname">172.23.168.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8b19d370-062b-11ee-9408-e16e7263f594">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.56.155</data>
43
+ <data key="n_hostname">100.64.56.155</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2865" target="HOST-9682">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697505777</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">b46117e0-6c8b-11ee-8c03-355f988cf3d5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>