diff --git a/graph/incidents_graphml/b/b3616c00-4166-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/b/b3616c00-4166-11ee-89c1-af7b5492d246.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66c57f40cc191c6bb6e5f2e81c07b0ff92947c23
--- /dev/null
+++ b/graph/incidents_graphml/b/b3616c00-4166-11ee-89c1-af7b5492d246.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.141
+ 100.64.96.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692761984
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3616c00-4166-11ee-89c1-af7b5492d246
+
+
+
diff --git a/graph/incidents_graphml/b/b3624cf0-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/b/b3624cf0-0c8d-11ee-af4a-2171e1d29da4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c63a5b67517e7dd986f70f9c892be59b9147e63
--- /dev/null
+++ b/graph/incidents_graphml/b/b3624cf0-0c8d-11ee-af4a-2171e1d29da4.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.127
+ 100.64.29.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.30.59
+ 100.64.30.59
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.56
+ 100.64.69.56
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1686951323
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3624cf0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951323
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3624cf0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951323
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3624cf0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951323
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3624cf0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951323
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3624cf0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951323
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3624cf0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951323
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3624cf0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951323
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3624cf0-0c8d-11ee-af4a-2171e1d29da4
+
+
+
diff --git a/graph/incidents_graphml/b/b3651920-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/b/b3651920-45d2-11ee-b6a5-451a7dc3db0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cffdc466217b2e0512ceb3828828f4416f8273f4
--- /dev/null
+++ b/graph/incidents_graphml/b/b3651920-45d2-11ee-b6a5-451a7dc3db0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.93
+ USER-0015-2067.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693248175
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3651920-45d2-11ee-b6a5-451a7dc3db0a
+
+
+
diff --git a/graph/incidents_graphml/b/b3653360-6b25-11ee-97c5-672d6deedc53.graphml b/graph/incidents_graphml/b/b3653360-6b25-11ee-97c5-672d6deedc53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b27a1732cceb95bbc3df237139948560991852f
--- /dev/null
+++ b/graph/incidents_graphml/b/b3653360-6b25-11ee-97c5-672d6deedc53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.2
+ 100.64.41.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697352016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3653360-6b25-11ee-97c5-672d6deedc53
+
+
+
diff --git a/graph/incidents_graphml/b/b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ad0331aadf31c26d5fac2c60a24f853791a4083
--- /dev/null
+++ b/graph/incidents_graphml/b/b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.39
+ 100.64.17.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708860381
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/b/b36f27a0-4166-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/b/b36f27a0-4166-11ee-89c1-af7b5492d246.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad7c2dcaa096e4a423aa688532027ba9f52b71dc
--- /dev/null
+++ b/graph/incidents_graphml/b/b36f27a0-4166-11ee-89c1-af7b5492d246.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.143
+ 100.64.96.143
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1692761984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b36f27a0-4166-11ee-89c1-af7b5492d246
+
+
+
diff --git a/graph/incidents_graphml/b/b3763020-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/b/b3763020-45d2-11ee-b6a5-451a7dc3db0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b410b83cbc51126e71e031ab0ab5940be047aea5
--- /dev/null
+++ b/graph/incidents_graphml/b/b3763020-45d2-11ee-b6a5-451a7dc3db0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.93
+ USER-0015-2067.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693248175
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3763020-45d2-11ee-b6a5-451a7dc3db0a
+
+
+
diff --git a/graph/incidents_graphml/b/b37778e0-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b37778e0-24c6-11ee-aa36-6b1924b88a3a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..368c00ec478961ab6d72777193ae523e15c8595a
--- /dev/null
+++ b/graph/incidents_graphml/b/b37778e0-24c6-11ee-aa36-6b1924b88a3a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.127
+ USER-0015-1213.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689614632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b37778e0-24c6-11ee-aa36-6b1924b88a3a
+
+
+
diff --git a/graph/incidents_graphml/b/b37ade40-6b25-11ee-97c5-672d6deedc53.graphml b/graph/incidents_graphml/b/b37ade40-6b25-11ee-97c5-672d6deedc53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc0527347d276d4eae01ff9f33ad7958752e85e9
--- /dev/null
+++ b/graph/incidents_graphml/b/b37ade40-6b25-11ee-97c5-672d6deedc53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.4
+ 100.64.41.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697352016
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b37ade40-6b25-11ee-97c5-672d6deedc53
+
+
+
diff --git a/graph/incidents_graphml/b/b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68358de5b65755aa40f4dff51c997ef1f6b0f9ff
--- /dev/null
+++ b/graph/incidents_graphml/b/b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.39
+ 100.64.17.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708860381
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/b/b386dd50-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/b/b386dd50-25e6-11ee-8760-d9b0ea984292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aac4f395304843e5c29ff1da031b79b2ea20de0f
--- /dev/null
+++ b/graph/incidents_graphml/b/b386dd50-25e6-11ee-8760-d9b0ea984292.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.215
+ 100.64.64.215
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.216
+ 100.64.64.216
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.195
+ 100.64.23.195
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.217
+ 100.64.64.217
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.218
+ 100.64.64.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.110
+ USER-0015-1308.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.219
+ 100.64.64.219
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738328
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b386dd50-25e6-11ee-8760-d9b0ea984292
+
+
+
diff --git a/graph/incidents_graphml/b/b38f6db0-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b38f6db0-24c6-11ee-aa36-6b1924b88a3a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2577b1550c58d18139af27152f4931f7a612a89b
--- /dev/null
+++ b/graph/incidents_graphml/b/b38f6db0-24c6-11ee-aa36-6b1924b88a3a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.127
+ USER-0015-1213.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689614633
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b38f6db0-24c6-11ee-aa36-6b1924b88a3a
+
+
+
diff --git a/graph/incidents_graphml/b/b3924530-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/b3924530-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a5afc45a2a20a4da4a1a3f4a6e6948961b95e37
--- /dev/null
+++ b/graph/incidents_graphml/b/b3924530-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.41
+ USER-0015-1211.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708860381
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3924530-d3d0-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/b/b3937c20-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/b/b3937c20-45d2-11ee-b6a5-451a7dc3db0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae01127fce3224803ac12e0afcf2ae7b10794d42
--- /dev/null
+++ b/graph/incidents_graphml/b/b3937c20-45d2-11ee-b6a5-451a7dc3db0a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.134.199
+ 192.168.134.199
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.95
+ 100.64.91.95
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693248175
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3937c20-45d2-11ee-b6a5-451a7dc3db0a
+
+
+ INCIDENT_LINK
+ 1693248175
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3937c20-45d2-11ee-b6a5-451a7dc3db0a
+
+
+
diff --git a/graph/incidents_graphml/b/b39b6230-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/b/b39b6230-3552-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c990008047040c9adea96c1ff99c863659f460a8
--- /dev/null
+++ b/graph/incidents_graphml/b/b39b6230-3552-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.227.172
+ USER-0015-2135.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.152
+ 100.64.95.152
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.153
+ 100.64.95.153
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.229
+ 100.64.89.229
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719581478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b39b6230-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b39b6230-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b39b6230-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b39b6230-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b39b6230-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b39b6230-3552-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/b/b3ad1a10-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/b/b3ad1a10-efc3-11ec-9799-0176ac54cf1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3c01b3eb24ced8cfb45e31bc053c9478026721a
--- /dev/null
+++ b/graph/incidents_graphml/b/b3ad1a10-efc3-11ec-9799-0176ac54cf1b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.42
+ 100.64.76.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.65
+ 100.64.72.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655638435
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3ad1a10-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638435
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3ad1a10-efc3-11ec-9799-0176ac54cf1b
+
+
+
diff --git a/graph/incidents_graphml/b/b3b45190-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/b/b3b45190-14b1-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7a7d0b5cd5834042eafa23b827499f3db92697b
--- /dev/null
+++ b/graph/incidents_graphml/b/b3b45190-14b1-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.240
+ 100.64.1.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.145
+ 100.64.79.145
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.57.100
+ 100.64.57.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687846395
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3b45190-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846395
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3b45190-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846395
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3b45190-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846395
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3b45190-14b1-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/b/b3b60140-31e7-11ee-b48d-2b64d5dc7f75.graphml b/graph/incidents_graphml/b/b3b60140-31e7-11ee-b48d-2b64d5dc7f75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba42e76b9f5964c1b5f0897406de219a64c7ecbd
--- /dev/null
+++ b/graph/incidents_graphml/b/b3b60140-31e7-11ee-b48d-2b64d5dc7f75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.125
+ 100.64.42.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691058171
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3b60140-31e7-11ee-b48d-2b64d5dc7f75
+
+
+
diff --git a/graph/incidents_graphml/b/b3c18a60-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b3c18a60-4b4b-11ee-a689-9b5633a6069d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f64a895947435f0a0235d22d7b40e633cc8bce4
--- /dev/null
+++ b/graph/incidents_graphml/b/b3c18a60-4b4b-11ee-a689-9b5633a6069d.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.229
+ 100.64.4.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693849900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3c18a60-4b4b-11ee-a689-9b5633a6069d
+
+
+ INCIDENT_LINK
+ 1693849900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3c18a60-4b4b-11ee-a689-9b5633a6069d
+
+
+
diff --git a/graph/incidents_graphml/b/b3c705f0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b3c705f0-892a-11ed-9e45-31aae3dc518d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a27e773cbc7e062b0c820458f5a1b8421b9285cc
--- /dev/null
+++ b/graph/incidents_graphml/b/b3c705f0-892a-11ed-9e45-31aae3dc518d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.10.72
+ 100.64.10.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1672505201
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3c705f0-892a-11ed-9e45-31aae3dc518d
+
+
+ INCIDENT_LINK
+ 1672505201
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3c705f0-892a-11ed-9e45-31aae3dc518d
+
+
+
diff --git a/graph/incidents_graphml/b/b3d03060-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b3d03060-4b4b-11ee-a689-9b5633a6069d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..228fae4adde3bb4b9e0db02ec3090c0ccc8bead7
--- /dev/null
+++ b/graph/incidents_graphml/b/b3d03060-4b4b-11ee-a689-9b5633a6069d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.229
+ 100.64.4.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693849900
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3d03060-4b4b-11ee-a689-9b5633a6069d
+
+
+
diff --git a/graph/incidents_graphml/b/b3d17880-31e7-11ee-b48d-2b64d5dc7f75.graphml b/graph/incidents_graphml/b/b3d17880-31e7-11ee-b48d-2b64d5dc7f75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c708ef90cdb4c03262542479027cd53187539a11
--- /dev/null
+++ b/graph/incidents_graphml/b/b3d17880-31e7-11ee-b48d-2b64d5dc7f75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.125
+ 100.64.42.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691058172
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3d17880-31e7-11ee-b48d-2b64d5dc7f75
+
+
+
diff --git a/graph/incidents_graphml/b/b3d71530-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b3d71530-7bd2-11ee-8fcf-9fbd42a0c461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f7b4d03659b4380ed65030a714bb5317c02f89e
--- /dev/null
+++ b/graph/incidents_graphml/b/b3d71530-7bd2-11ee-8fcf-9fbd42a0c461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.13
+ 100.64.39.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699185538
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3d71530-7bd2-11ee-8fcf-9fbd42a0c461
+
+
+
diff --git a/graph/incidents_graphml/b/b3e30100-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b3e30100-a5e0-11ee-af6c-2f69bce079e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fef961703cf0190d3fddb775f929cb4fda58132d
--- /dev/null
+++ b/graph/incidents_graphml/b/b3e30100-a5e0-11ee-af6c-2f69bce079e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.35
+ 100.64.25.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703809500
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3e30100-a5e0-11ee-af6c-2f69bce079e5
+
+
+
diff --git a/graph/incidents_graphml/b/b3e713c0-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b3e713c0-4b4b-11ee-a689-9b5633a6069d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85bc25466e1ced43448b42b3d29230d6a15dba30
--- /dev/null
+++ b/graph/incidents_graphml/b/b3e713c0-4b4b-11ee-a689-9b5633a6069d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.22
+ 100.64.49.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693849900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3e713c0-4b4b-11ee-a689-9b5633a6069d
+
+
+
diff --git a/graph/incidents_graphml/b/b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3be2901c91225076f88bc2f3e51b4a88cdf7446b
--- /dev/null
+++ b/graph/incidents_graphml/b/b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.13
+ 100.64.39.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699185538
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461
+
+
+
diff --git a/graph/incidents_graphml/b/b3ec7270-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/b/b3ec7270-3b73-11ef-b1e4-3da31b742190.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30168e6ffda95ad171160ce8bfc9d27059264489
--- /dev/null
+++ b/graph/incidents_graphml/b/b3ec7270-3b73-11ef-b1e4-3da31b742190.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.24
+ 100.64.46.24
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.25
+ 100.64.46.25
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.100
+ 100.64.32.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.26
+ 100.64.46.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.107
+ 100.64.36.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3ec7270-3b73-11ef-b1e4-3da31b742190
+
+
+
diff --git a/graph/incidents_graphml/b/b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75.graphml b/graph/incidents_graphml/b/b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9715da8d65ba18f5ca419274708878f036fda4d
--- /dev/null
+++ b/graph/incidents_graphml/b/b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.202
+ 100.64.20.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691058172
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75
+
+
+
diff --git a/graph/incidents_graphml/b/b3f4a850-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b3f4a850-4b4b-11ee-a689-9b5633a6069d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be6d2a0a5b074929d5c64376222f5eec44b6166e
--- /dev/null
+++ b/graph/incidents_graphml/b/b3f4a850-4b4b-11ee-a689-9b5633a6069d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.22
+ 100.64.49.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693849900
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3f4a850-4b4b-11ee-a689-9b5633a6069d
+
+
+
diff --git a/graph/incidents_graphml/b/b3f4d180-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b3f4d180-de41-11ed-8036-d144f5e7f2f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eba0e5621dfbfc6ccfae4e54e1eba1b546dbc08e
--- /dev/null
+++ b/graph/incidents_graphml/b/b3f4d180-de41-11ed-8036-d144f5e7f2f2.graphml
@@ -0,0 +1,725 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.135
+ 100.64.16.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.1.39
+ 100.64.1.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.180
+ 100.64.77.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.1.157
+ HOST-14854
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.78.102
+ 100.64.78.102
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.172
+ USER-0015-1672.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.104
+ 100.64.72.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki"]
+
+
+ HOST
+ 100.64.78.103
+ 100.64.78.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.104
+ 100.64.78.104
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.27.195
+ 100.64.27.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.73
+ HOST-14855
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.192
+ 100.64.14.192
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.181
+ HOST-14580
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.1.51
+ HOST-14856
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.68.216
+ 100.64.68.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.78.105
+ 100.64.78.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860929
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b3f4d180-de41-11ed-8036-d144f5e7f2f2
+
+
+
diff --git a/graph/incidents_graphml/b/b3f7fc20-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b3f7fc20-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01527bce688a9d4fdb81d84d0caea973464905a9
--- /dev/null
+++ b/graph/incidents_graphml/b/b3f7fc20-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.201
+ 100.64.26.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909039
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3f7fc20-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b3fca1f0-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b3fca1f0-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f5d442bab8c8596a7fbffcff1ab929e7a58a2b7
--- /dev/null
+++ b/graph/incidents_graphml/b/b3fca1f0-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.186
+ 100.64.8.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740019
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b3fca1f0-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b3ffc5b0-6b25-11ee-97c5-672d6deedc53.graphml b/graph/incidents_graphml/b/b3ffc5b0-6b25-11ee-97c5-672d6deedc53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4e37c6c1c1f0ec2bc9198bc391199e89b538680
--- /dev/null
+++ b/graph/incidents_graphml/b/b3ffc5b0-6b25-11ee-97c5-672d6deedc53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697352017
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b3ffc5b0-6b25-11ee-97c5-672d6deedc53
+
+
+
diff --git a/graph/incidents_graphml/b/b4062cf0-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b4062cf0-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb417205d3975c68fc250ed2ec02b0becb4f3abc
--- /dev/null
+++ b/graph/incidents_graphml/b/b4062cf0-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.16
+ 100.64.43.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909040
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4062cf0-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b408cc90-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b408cc90-4b4b-11ee-a689-9b5633a6069d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57535b35b0b345ba7f5bec66788cc25130e15680
--- /dev/null
+++ b/graph/incidents_graphml/b/b408cc90-4b4b-11ee-a689-9b5633a6069d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.148
+ 100.64.9.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693849901
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b408cc90-4b4b-11ee-a689-9b5633a6069d
+
+
+
diff --git a/graph/incidents_graphml/b/b40f2f00-6b25-11ee-97c5-672d6deedc53.graphml b/graph/incidents_graphml/b/b40f2f00-6b25-11ee-97c5-672d6deedc53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2548e94065d3b09506e359a4e146ceaf1e87f2a8
--- /dev/null
+++ b/graph/incidents_graphml/b/b40f2f00-6b25-11ee-97c5-672d6deedc53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697352017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b40f2f00-6b25-11ee-97c5-672d6deedc53
+
+
+
diff --git a/graph/incidents_graphml/b/b41186b0-076a-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/b/b41186b0-076a-11ef-93a8-d78cfa287885.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50e60e5ea8fc6d4b0e39777968e730f91c7692d6
--- /dev/null
+++ b/graph/incidents_graphml/b/b41186b0-076a-11ef-93a8-d78cfa287885.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.68
+ 100.64.65.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1714534034
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b41186b0-076a-11ef-93a8-d78cfa287885
+
+
+
diff --git a/graph/incidents_graphml/b/b4146550-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b4146550-4b4b-11ee-a689-9b5633a6069d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99f8246640d15070847b995ef0344023e25f286d
--- /dev/null
+++ b/graph/incidents_graphml/b/b4146550-4b4b-11ee-a689-9b5633a6069d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.226
+ 100.64.14.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693849901
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4146550-4b4b-11ee-a689-9b5633a6069d
+
+
+
diff --git a/graph/incidents_graphml/b/b4186cb0-21b9-11ee-ad82-796ed23e6009.graphml b/graph/incidents_graphml/b/b4186cb0-21b9-11ee-ad82-796ed23e6009.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1786a8b9106189b03c9c14ebb684ea03fbcd2c12
--- /dev/null
+++ b/graph/incidents_graphml/b/b4186cb0-21b9-11ee-ad82-796ed23e6009.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.43
+ USER-0015-1244.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689279197
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4186cb0-21b9-11ee-ad82-796ed23e6009
+
+
+
diff --git a/graph/incidents_graphml/b/b41aa6f0-2800-11ed-b924-cd5cf98263a8.graphml b/graph/incidents_graphml/b/b41aa6f0-2800-11ed-b924-cd5cf98263a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62c10c3eaeb3de825be8d44094651b756258e386
--- /dev/null
+++ b/graph/incidents_graphml/b/b41aa6f0-2800-11ed-b924-cd5cf98263a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.80.157
+ 100.64.80.157
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661821900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b41aa6f0-2800-11ed-b924-cd5cf98263a8
+
+
+
diff --git a/graph/incidents_graphml/b/b41d1050-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b41d1050-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13ab98dc444ca78109e55101c867c1b120ba8805
--- /dev/null
+++ b/graph/incidents_graphml/b/b41d1050-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.16
+ 100.64.43.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909040
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b41d1050-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b41ffe10-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b41ffe10-4b4b-11ee-a689-9b5633a6069d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4590fcf74c269a9040078eaa602810a34b42b000
--- /dev/null
+++ b/graph/incidents_graphml/b/b41ffe10-4b4b-11ee-a689-9b5633a6069d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.226
+ 100.64.14.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693849901
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b41ffe10-4b4b-11ee-a689-9b5633a6069d
+
+
+
diff --git a/graph/incidents_graphml/b/b4372a80-70e5-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/b/b4372a80-70e5-11ee-adf7-3be9df66b766.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d530c3a158cd38b50b20067d0212144b10115ca5
--- /dev/null
+++ b/graph/incidents_graphml/b/b4372a80-70e5-11ee-adf7-3be9df66b766.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.76
+ 100.64.68.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1697984236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4372a80-70e5-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4372a80-70e5-11ee-adf7-3be9df66b766
+
+
+
diff --git a/graph/incidents_graphml/b/b439c7a0-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b439c7a0-4b4b-11ee-a689-9b5633a6069d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb2f425f52ab1817098914b4d20d07d4cb14d592
--- /dev/null
+++ b/graph/incidents_graphml/b/b439c7a0-4b4b-11ee-a689-9b5633a6069d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.29
+ 100.64.12.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693849901
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b439c7a0-4b4b-11ee-a689-9b5633a6069d
+
+
+
diff --git a/graph/incidents_graphml/b/b4436050-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/b4436050-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28d76a7e6818e32c2bdb9a85b6fe69abeb70a077
--- /dev/null
+++ b/graph/incidents_graphml/b/b4436050-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.29.5
+ 100.64.29.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678367832
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4436050-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/b/b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91a6a9a200471667e8914c023f9a960283042c8e
--- /dev/null
+++ b/graph/incidents_graphml/b/b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.193
+ 100.64.12.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699185539
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461
+
+
+
diff --git a/graph/incidents_graphml/b/b4507610-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b4507610-6c8b-11ee-8c03-355f988cf3d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5212b879d30b80d9b08b23460a62b70b2627662
--- /dev/null
+++ b/graph/incidents_graphml/b/b4507610-6c8b-11ee-8c03-355f988cf3d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.155
+ 100.64.56.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697505777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4507610-6c8b-11ee-8c03-355f988cf3d5
+
+
+
diff --git a/graph/incidents_graphml/b/b4546070-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b4546070-a5e0-11ee-af6c-2f69bce079e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..397fe872212bd24faedf1e7733f06d0923259d9e
--- /dev/null
+++ b/graph/incidents_graphml/b/b4546070-a5e0-11ee-af6c-2f69bce079e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.243
+ 100.64.18.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703809501
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4546070-a5e0-11ee-af6c-2f69bce079e5
+
+
+
diff --git a/graph/incidents_graphml/b/b45ab2e0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/b45ab2e0-11c0-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9ece61bcdec6b8cb52998e40885ad88b34f48ae
--- /dev/null
+++ b/graph/incidents_graphml/b/b45ab2e0-11c0-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.228
+ 100.64.12.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.217
+ 100.64.74.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.109
+ 100.64.82.109
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b45ab2e0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b45ab2e0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b45ab2e0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b45ab2e0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b45ab2e0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b45ab2e0-11c0-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/b/b46117e0-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b46117e0-6c8b-11ee-8c03-355f988cf3d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea78879fff8e66fc6a0b6afd54f6de6fbc4cdefc
--- /dev/null
+++ b/graph/incidents_graphml/b/b46117e0-6c8b-11ee-8c03-355f988cf3d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.155
+ 100.64.56.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697505777
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b46117e0-6c8b-11ee-8c03-355f988cf3d5
+
+
+
diff --git a/graph/incidents_graphml/b/b4659e80-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b4659e80-a5e0-11ee-af6c-2f69bce079e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a63372bf46d19d8f572358c013d1c57f7c1638b
--- /dev/null
+++ b/graph/incidents_graphml/b/b4659e80-a5e0-11ee-af6c-2f69bce079e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.243
+ 100.64.18.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703809501
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b4659e80-a5e0-11ee-af6c-2f69bce079e5
+
+
+
diff --git a/graph/incidents_graphml/b/b4661fa0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/b4661fa0-b6de-11ed-9d21-f346d8153a36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0124aa7b8bb877f049c4d30d587fcfdfcc52410f
--- /dev/null
+++ b/graph/incidents_graphml/b/b4661fa0-b6de-11ed-9d21-f346d8153a36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.199
+ 100.64.91.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677530314
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b4661fa0-b6de-11ed-9d21-f346d8153a36
+
+
+
diff --git a/graph/incidents_graphml/b/b46953f0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/b46953f0-b6de-11ed-9d21-f346d8153a36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88ef08abfd7324f50ceaad481dd10dbabd4a9f40
--- /dev/null
+++ b/graph/incidents_graphml/b/b46953f0-b6de-11ed-9d21-f346d8153a36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.201
+ 100.64.91.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677530314
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b46953f0-b6de-11ed-9d21-f346d8153a36
+
+
+
diff --git a/graph/incidents_graphml/b/b46d99b0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/b46d99b0-b6de-11ed-9d21-f346d8153a36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9958cd4e08d474e92938a62e3c6e09f87135644f
--- /dev/null
+++ b/graph/incidents_graphml/b/b46d99b0-b6de-11ed-9d21-f346d8153a36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.201
+ 100.64.91.201
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677530314
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b46d99b0-b6de-11ed-9d21-f346d8153a36
+
+
+
diff --git a/graph/incidents_graphml/b/b46db540-1291-11ed-83c9-c740e142a095.graphml b/graph/incidents_graphml/b/b46db540-1291-11ed-83c9-c740e142a095.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..243a0a14477eb49e62cd6acdf96da3473ee5504c
--- /dev/null
+++ b/graph/incidents_graphml/b/b46db540-1291-11ed-83c9-c740e142a095.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.19.54.137
+ 172.19.54.137
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.226
+ 100.64.89.226
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659465252
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b46db540-1291-11ed-83c9-c740e142a095
+
+
+ INCIDENT_LINK
+ 1659465252
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b46db540-1291-11ed-83c9-c740e142a095
+
+
+
diff --git a/graph/incidents_graphml/b/b47730b0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b47730b0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcd9a4cee8a8ea738ec60d50afaa5e32e94ce633
--- /dev/null
+++ b/graph/incidents_graphml/b/b47730b0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.46
+ 100.64.21.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691969994
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b47730b0-3a32-11ee-a0d4-2bfcb77b8e2b
+
+
+
diff --git a/graph/incidents_graphml/b/b47762a0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/b47762a0-11c0-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..636501cbac7fced5a837f9d1754f856dd625338c
--- /dev/null
+++ b/graph/incidents_graphml/b/b47762a0-11c0-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.103
+ 100.64.10.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.42
+ 100.64.72.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.220
+ 100.64.72.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b47762a0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b47762a0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b47762a0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b47762a0-11c0-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/b/b47c8960-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/b/b47c8960-0cf7-11ee-aa7f-c3325e1e3407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ff9d29b375770c63577f20807c27d45608ec311
--- /dev/null
+++ b/graph/incidents_graphml/b/b47c8960-0cf7-11ee-aa7f-c3325e1e3407.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.59
+ 100.64.75.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b47c8960-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b47c8960-0cf7-11ee-aa7f-c3325e1e3407
+
+
+
diff --git a/graph/incidents_graphml/b/b47fb4a0-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b47fb4a0-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5e0225763b2651b92f42a85f499359f7ea9dc40
--- /dev/null
+++ b/graph/incidents_graphml/b/b47fb4a0-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.128
+ 100.64.15.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b47fb4a0-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b480c9f0-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b480c9f0-a1f6-11ee-8be4-0756a5149684.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2dc4ae57c6704ed2a74feb5ef0060c074fa4aa90
--- /dev/null
+++ b/graph/incidents_graphml/b/b480c9f0-a1f6-11ee-8be4-0756a5149684.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.128
+ 100.64.47.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379145
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b480c9f0-a1f6-11ee-8be4-0756a5149684
+
+
+ INCIDENT_LINK
+ 1703379145
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b480c9f0-a1f6-11ee-8be4-0756a5149684
+
+
+
diff --git a/graph/incidents_graphml/b/b48557c0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b48557c0-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f946acd2dcc6f527c11e659fbb66aaf0763122f9
--- /dev/null
+++ b/graph/incidents_graphml/b/b48557c0-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.37
+ 100.64.39.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854529
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b48557c0-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/b48b0c80-2824-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/b/b48b0c80-2824-11ef-b581-4d62d2263ef1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62c834f1180cfda6ca87bb74b8c33fedc4da189c
--- /dev/null
+++ b/graph/incidents_graphml/b/b48b0c80-2824-11ef-b581-4d62d2263ef1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.135.111
+ 172.16.135.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory","Stealthwatch"]
+
+
+ HOST
+ 100.64.97.120
+ 100.64.97.120
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718132358
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b48b0c80-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132358
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b48b0c80-2824-11ef-b581-4d62d2263ef1
+
+
+
diff --git a/graph/incidents_graphml/b/b48da480-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/b/b48da480-6327-11ee-84e8-6f3a76e74a81.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d07da2365eaad24430523df9b72c875a43a53213
--- /dev/null
+++ b/graph/incidents_graphml/b/b48da480-6327-11ee-84e8-6f3a76e74a81.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.58
+ 100.64.21.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696473267
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b48da480-6327-11ee-84e8-6f3a76e74a81
+
+
+
diff --git a/graph/incidents_graphml/b/b48f6c10-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b48f6c10-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2dbc5bd48499a2ba91e6c063ba40134913776739
--- /dev/null
+++ b/graph/incidents_graphml/b/b48f6c10-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.128
+ 100.64.15.128
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740020
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b48f6c10-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b4900fe0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b4900fe0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b549a0fc6f8c8d2c64623c693b8c5d718a58180
--- /dev/null
+++ b/graph/incidents_graphml/b/b4900fe0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.219
+ 100.64.53.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691969994
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b4900fe0-3a32-11ee-a0d4-2bfcb77b8e2b
+
+
+
diff --git a/graph/incidents_graphml/b/b4949a00-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b4949a00-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3f2404ad14f4623967c1ad2b1d40dd6d564f3c7
--- /dev/null
+++ b/graph/incidents_graphml/b/b4949a00-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.37
+ 100.64.39.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854529
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b4949a00-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/b49523d0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/b49523d0-11c0-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3ce89a391ba301f88d787f715566e9d9e411dba
--- /dev/null
+++ b/graph/incidents_graphml/b/b49523d0-11c0-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.110
+ 100.64.82.110
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49523d0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49523d0-11c0-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/b/b49c7190-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/b/b49c7190-6327-11ee-84e8-6f3a76e74a81.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f1eb93bbce8f9b49510f3dcb79853379b2b4f9d
--- /dev/null
+++ b/graph/incidents_graphml/b/b49c7190-6327-11ee-84e8-6f3a76e74a81.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.58
+ 100.64.21.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696473268
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b49c7190-6327-11ee-84e8-6f3a76e74a81
+
+
+
diff --git a/graph/incidents_graphml/b/b49c8f50-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b49c8f50-a1f6-11ee-8be4-0756a5149684.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a45c56aa624beff35dfc5888c39256dedf1bbe94
--- /dev/null
+++ b/graph/incidents_graphml/b/b49c8f50-a1f6-11ee-8be4-0756a5149684.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.129
+ 100.64.62.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379145
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b49c8f50-a1f6-11ee-8be4-0756a5149684
+
+
+
diff --git a/graph/incidents_graphml/b/b49c9480-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/b/b49c9480-0cf7-11ee-aa7f-c3325e1e3407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bde1e9520b0e8b09e3a3b1278b8fbc0c15282741
--- /dev/null
+++ b/graph/incidents_graphml/b/b49c9480-0cf7-11ee-aa7f-c3325e1e3407.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1710.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.60
+ 100.64.75.60
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.61
+ USER-0015-1711.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.62
+ 100.64.75.62
+ ["Exploiting Target","Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.63
+ 100.64.75.63
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49c9480-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49c9480-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49c9480-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49c9480-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49c9480-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49c9480-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49c9480-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996852
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49c9480-0cf7-11ee-aa7f-c3325e1e3407
+
+
+
diff --git a/graph/incidents_graphml/b/b49e4520-1eb1-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/b/b49e4520-1eb1-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0d96a24d8330f6e7f9a5db98553de7351ad12fe
--- /dev/null
+++ b/graph/incidents_graphml/b/b49e4520-1eb1-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,351 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.1
+ 100.64.64.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.2
+ 100.64.64.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.218
+ 100.64.14.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.158
+ 100.64.55.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.3
+ 100.64.64.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.227
+ 100.64.40.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.12
+ 100.64.9.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.88
+ 100.64.37.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.4
+ 100.64.64.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945908
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b49e4520-1eb1-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/b/b4a02cb0-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b4a02cb0-de41-11ed-8036-d144f5e7f2f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08fd3f573217a10ed1089a5e2debc5a9fdd24a92
--- /dev/null
+++ b/graph/incidents_graphml/b/b4a02cb0-de41-11ed-8036-d144f5e7f2f2.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.13
+ 100.64.39.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.57
+ 100.64.72.57
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.78.106
+ 100.64.78.106
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.19.83
+ 100.64.19.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1681860930
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a02cb0-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860930
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a02cb0-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860930
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a02cb0-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860930
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a02cb0-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860930
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a02cb0-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860930
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a02cb0-de41-11ed-8036-d144f5e7f2f2
+
+
+
diff --git a/graph/incidents_graphml/b/b4a0aa20-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b4a0aa20-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0131989e2993866847be9a692c413b15998ce19
--- /dev/null
+++ b/graph/incidents_graphml/b/b4a0aa20-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.130
+ 100.64.15.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740020
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b4a0aa20-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b4a74170-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/b/b4a74170-25e6-11ee-8760-d9b0ea984292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d016492671fb06dccfce2e4d222ef35b461e8bf3
--- /dev/null
+++ b/graph/incidents_graphml/b/b4a74170-25e6-11ee-8760-d9b0ea984292.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.186
+ 100.64.13.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.71
+ 100.64.7.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.225
+ 100.64.64.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.105
+ 100.64.14.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.98
+ 100.64.16.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.10
+ 100.64.46.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.226
+ 100.64.64.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.215
+ 100.64.28.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.113
+ 100.64.57.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.227
+ USER-0015-1463.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.228
+ 100.64.64.228
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.229
+ 100.64.64.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.125
+ 100.64.26.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.172
+ 100.64.49.172
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.88
+ 100.64.41.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.243
+ 100.64.40.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.230
+ 100.64.64.230
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.231
+ 100.64.64.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a74170-25e6-11ee-8760-d9b0ea984292
+
+
+
diff --git a/graph/incidents_graphml/b/b4a78bd0-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b4a78bd0-a1f6-11ee-8be4-0756a5149684.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40fa018db144ee630694fac0700e932e1a5876e0
--- /dev/null
+++ b/graph/incidents_graphml/b/b4a78bd0-a1f6-11ee-8be4-0756a5149684.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.242
+ 100.64.8.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379146
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a78bd0-a1f6-11ee-8be4-0756a5149684
+
+
+
diff --git a/graph/incidents_graphml/b/b4a8ef10-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b4a8ef10-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b56d32bac086db801f7dee74b219d554ff62af08
--- /dev/null
+++ b/graph/incidents_graphml/b/b4a8ef10-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.221
+ 100.64.53.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691969995
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4a8ef10-3a32-11ee-a0d4-2bfcb77b8e2b
+
+
+
diff --git a/graph/incidents_graphml/b/b4b631d0-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b4b631d0-a1f6-11ee-8be4-0756a5149684.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa3f77ebfed28f1699dfb316be5e4967587fde74
--- /dev/null
+++ b/graph/incidents_graphml/b/b4b631d0-a1f6-11ee-8be4-0756a5149684.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.242
+ 100.64.8.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379146
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b4b631d0-a1f6-11ee-8be4-0756a5149684
+
+
+
diff --git a/graph/incidents_graphml/b/b4befa60-4e02-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/b/b4befa60-4e02-11ee-b83a-49677896a1e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..299a917be523ccfabd09ea625ec6ab2b5c7fc4b9
--- /dev/null
+++ b/graph/incidents_graphml/b/b4befa60-4e02-11ee-b83a-49677896a1e8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.206
+ 100.64.47.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694148402
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4befa60-4e02-11ee-b83a-49677896a1e8
+
+
+
diff --git a/graph/incidents_graphml/b/b4c5b120-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/b/b4c5b120-e560-11ee-be14-8bb84b2c14a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9da8d751b0e3477987725bbd2f2c21ba323cc84d
--- /dev/null
+++ b/graph/incidents_graphml/b/b4c5b120-e560-11ee-be14-8bb84b2c14a8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.95
+ 100.64.68.95
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1710791400
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4c5b120-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791400
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4c5b120-e560-11ee-be14-8bb84b2c14a8
+
+
+
diff --git a/graph/incidents_graphml/b/b4d149e0-4e02-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/b/b4d149e0-4e02-11ee-b83a-49677896a1e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26e249d901bd2fc313a26c68af5d44cc9af4d4ce
--- /dev/null
+++ b/graph/incidents_graphml/b/b4d149e0-4e02-11ee-b83a-49677896a1e8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.206
+ 100.64.47.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694148402
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b4d149e0-4e02-11ee-b83a-49677896a1e8
+
+
+
diff --git a/graph/incidents_graphml/b/b4dab4b0-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b4dab4b0-6c8b-11ee-8c03-355f988cf3d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7ce519e110446e77e876f7d9edc0ba012082f89
--- /dev/null
+++ b/graph/incidents_graphml/b/b4dab4b0-6c8b-11ee-8c03-355f988cf3d5.graphml
@@ -0,0 +1,533 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.157
+ 100.64.56.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.158
+ 100.64.56.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.159
+ 100.64.56.159
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.59
+ HOST-2863
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.83
+ 100.64.11.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.160
+ 100.64.56.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.76
+ 100.64.54.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.213
+ 100.64.18.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.244
+ 100.64.35.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.161
+ 100.64.56.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.162
+ USER-0015-1416.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.163
+ 100.64.56.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4dab4b0-6c8b-11ee-8c03-355f988cf3d5
+
+
+
diff --git a/graph/incidents_graphml/b/b4e5c510-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b4e5c510-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..774ff862bb667de98393caafee677dc1dc049f5e
--- /dev/null
+++ b/graph/incidents_graphml/b/b4e5c510-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.234
+ 100.64.46.234
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.235
+ 100.64.46.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.236
+ 100.64.46.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.233
+ 100.64.24.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915975
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4e5c510-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915975
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4e5c510-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915975
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4e5c510-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915975
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4e5c510-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915975
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4e5c510-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915975
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4e5c510-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915975
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4e5c510-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915975
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4e5c510-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b4ebf2c0-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b4ebf2c0-6c8b-11ee-8c03-355f988cf3d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b4ff835c9554b18e723c8ad0deb10c057b0737c
--- /dev/null
+++ b/graph/incidents_graphml/b/b4ebf2c0-6c8b-11ee-8c03-355f988cf3d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.157
+ 100.64.56.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b4ebf2c0-6c8b-11ee-8c03-355f988cf3d5
+
+
+
diff --git a/graph/incidents_graphml/b/b4edba40-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b4edba40-a5e0-11ee-af6c-2f69bce079e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..251330e8cd2a081aedda19e03f9609698c83461a
--- /dev/null
+++ b/graph/incidents_graphml/b/b4edba40-a5e0-11ee-af6c-2f69bce079e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.64
+ 100.64.36.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703809502
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b4edba40-a5e0-11ee-af6c-2f69bce079e5
+
+
+
diff --git a/graph/incidents_graphml/b/b4f91220-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b4f91220-6c8b-11ee-8c03-355f988cf3d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56692365a206a3cc86c1f1de06de3de3a15577fb
--- /dev/null
+++ b/graph/incidents_graphml/b/b4f91220-6c8b-11ee-8c03-355f988cf3d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.171
+ 100.64.56.171
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4f91220-6c8b-11ee-8c03-355f988cf3d5
+
+
+
diff --git a/graph/incidents_graphml/b/b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77.graphml b/graph/incidents_graphml/b/b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37072f7da58864d5975883cf7061421a4589fef1
--- /dev/null
+++ b/graph/incidents_graphml/b/b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.54
+ 100.64.41.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700787992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77
+
+
+ INCIDENT_LINK
+ 1700787992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77
+
+
+
diff --git a/graph/incidents_graphml/b/b5031950-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b5031950-a1f6-11ee-8be4-0756a5149684.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4800006d6efeef5cef23dca5b0be906f7dd1e56d
--- /dev/null
+++ b/graph/incidents_graphml/b/b5031950-a1f6-11ee-8be4-0756a5149684.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.186
+ 100.64.49.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5031950-a1f6-11ee-8be4-0756a5149684
+
+
+
diff --git a/graph/incidents_graphml/b/b50709b0-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b50709b0-7bd2-11ee-8fcf-9fbd42a0c461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e784097c2387955c5346de1d99991f235e98673e
--- /dev/null
+++ b/graph/incidents_graphml/b/b50709b0-7bd2-11ee-8fcf-9fbd42a0c461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.15
+ 100.64.39.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699185540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b50709b0-7bd2-11ee-8fcf-9fbd42a0c461
+
+
+
diff --git a/graph/incidents_graphml/b/b5098ce0-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b5098ce0-6c8b-11ee-8c03-355f988cf3d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08c4833a2a89937728e81dc933b40cbe4166fd1f
--- /dev/null
+++ b/graph/incidents_graphml/b/b5098ce0-6c8b-11ee-8c03-355f988cf3d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.171
+ 100.64.56.171
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697505778
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b5098ce0-6c8b-11ee-8c03-355f988cf3d5
+
+
+
diff --git a/graph/incidents_graphml/b/b509d3c0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b509d3c0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..600ca899fe8e3143c55e4b9317ee69531fcae93f
--- /dev/null
+++ b/graph/incidents_graphml/b/b509d3c0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.93
+ 100.64.47.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691969995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b509d3c0-3a32-11ee-a0d4-2bfcb77b8e2b
+
+
+
diff --git a/graph/incidents_graphml/b/b50a4d40-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/b/b50a4d40-3150-11ee-9a81-45e5b946e7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..729d61e982d2de250a98de389a52e6d03c183e45
--- /dev/null
+++ b/graph/incidents_graphml/b/b50a4d40-3150-11ee-9a81-45e5b946e7a5.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.78
+ 100.64.9.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.79
+ 100.64.9.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.80
+ 100.64.9.80
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.81
+ 100.64.9.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.82
+ 100.64.9.82
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993320
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50a4d40-3150-11ee-9a81-45e5b946e7a5
+
+
+
diff --git a/graph/incidents_graphml/b/b50cf7c0-8a65-11ee-a23c-e7bfb59a1c77.graphml b/graph/incidents_graphml/b/b50cf7c0-8a65-11ee-a23c-e7bfb59a1c77.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ee0cfdca151790847d70f27fcd593d532accf04
--- /dev/null
+++ b/graph/incidents_graphml/b/b50cf7c0-8a65-11ee-a23c-e7bfb59a1c77.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.54
+ 100.64.41.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700787992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b50cf7c0-8a65-11ee-a23c-e7bfb59a1c77
+
+
+
diff --git a/graph/incidents_graphml/b/b50f9a70-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b50f9a70-6503-11ee-b447-a9f06618d419.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d75777b599d96a84394841f3f6fde9c7f5a612da
--- /dev/null
+++ b/graph/incidents_graphml/b/b50f9a70-6503-11ee-b447-a9f06618d419.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.43.19
+ 192.168.43.19
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.251
+ 100.64.89.251
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696677709
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50f9a70-6503-11ee-b447-a9f06618d419
+
+
+ INCIDENT_LINK
+ 1696677709
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b50f9a70-6503-11ee-b447-a9f06618d419
+
+
+
diff --git a/graph/incidents_graphml/b/b510ade0-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b510ade0-a1f6-11ee-8be4-0756a5149684.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e29f73d4cf8fa7248813ebb62353a4c273a24a2
--- /dev/null
+++ b/graph/incidents_graphml/b/b510ade0-a1f6-11ee-8be4-0756a5149684.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.186
+ 100.64.49.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379146
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b510ade0-a1f6-11ee-8be4-0756a5149684
+
+
+
diff --git a/graph/incidents_graphml/b/b5172170-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b5172170-6c8b-11ee-8c03-355f988cf3d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b0eddc92d51fedba892f876d52f496732bbbcc0
--- /dev/null
+++ b/graph/incidents_graphml/b/b5172170-6c8b-11ee-8c03-355f988cf3d5.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.222
+ 100.64.13.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697505779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5172170-6c8b-11ee-8c03-355f988cf3d5
+
+
+ INCIDENT_LINK
+ 1697505779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5172170-6c8b-11ee-8c03-355f988cf3d5
+
+
+
diff --git a/graph/incidents_graphml/b/b5178470-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b5178470-7bd2-11ee-8fcf-9fbd42a0c461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..185a9b51be0bef897c9dd775cde9416fe94cdcac
--- /dev/null
+++ b/graph/incidents_graphml/b/b5178470-7bd2-11ee-8fcf-9fbd42a0c461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.15
+ 100.64.39.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699185540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b5178470-7bd2-11ee-8fcf-9fbd42a0c461
+
+
+
diff --git a/graph/incidents_graphml/b/b51bc4d0-8a65-11ee-a23c-e7bfb59a1c77.graphml b/graph/incidents_graphml/b/b51bc4d0-8a65-11ee-a23c-e7bfb59a1c77.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c92c2af2564ce2002f118e88685cd81be0094bc
--- /dev/null
+++ b/graph/incidents_graphml/b/b51bc4d0-8a65-11ee-a23c-e7bfb59a1c77.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.239
+ 100.64.26.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700787993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b51bc4d0-8a65-11ee-a23c-e7bfb59a1c77
+
+
+
diff --git a/graph/incidents_graphml/b/b51e9090-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b51e9090-a1f6-11ee-8be4-0756a5149684.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7759f7e7f62b0e4e213a0145c0c0e738da5902c
--- /dev/null
+++ b/graph/incidents_graphml/b/b51e9090-a1f6-11ee-8be4-0756a5149684.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.143
+ 100.64.32.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379146
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b51e9090-a1f6-11ee-8be4-0756a5149684
+
+
+
diff --git a/graph/incidents_graphml/b/b51f78f0-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b51f78f0-6503-11ee-b447-a9f06618d419.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9442ae72b21c8be7c0048f3ce1d0d33636f17602
--- /dev/null
+++ b/graph/incidents_graphml/b/b51f78f0-6503-11ee-b447-a9f06618d419.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.253
+ 100.64.89.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696677709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b51f78f0-6503-11ee-b447-a9f06618d419
+
+
+
diff --git a/graph/incidents_graphml/b/b520b720-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b520b720-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9caf010430c6c675bb2871d59e66f2a29eec39c
--- /dev/null
+++ b/graph/incidents_graphml/b/b520b720-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.93
+ 100.64.47.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691969995
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b520b720-3a32-11ee-a0d4-2bfcb77b8e2b
+
+
+
diff --git a/graph/incidents_graphml/b/b5216bd0-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/b/b5216bd0-1411-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfdab069e00ed8958120b00a79111ec413961cc9
--- /dev/null
+++ b/graph/incidents_graphml/b/b5216bd0-1411-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.76
+ 100.64.65.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687777678
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5216bd0-1411-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/b/b5301ac0-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b5301ac0-6503-11ee-b447-a9f06618d419.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae7d01488b2608f047dd8eaa44b1dc9721f19e30
--- /dev/null
+++ b/graph/incidents_graphml/b/b5301ac0-6503-11ee-b447-a9f06618d419.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.253
+ 100.64.89.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696677709
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b5301ac0-6503-11ee-b447-a9f06618d419
+
+
+
diff --git a/graph/incidents_graphml/b/b537e670-21b9-11ee-ad82-796ed23e6009.graphml b/graph/incidents_graphml/b/b537e670-21b9-11ee-ad82-796ed23e6009.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7b07249a8437be29397f6fd54f34b67952c4ffc
--- /dev/null
+++ b/graph/incidents_graphml/b/b537e670-21b9-11ee-ad82-796ed23e6009.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.177
+ 100.64.23.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689279199
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b537e670-21b9-11ee-ad82-796ed23e6009
+
+
+
diff --git a/graph/incidents_graphml/b/b53c0750-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b53c0750-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d5f8cbbcf609538b11ea1d8b39b9a00af01392d
--- /dev/null
+++ b/graph/incidents_graphml/b/b53c0750-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.223
+ 100.64.53.223
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691969996
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b53c0750-3a32-11ee-a0d4-2bfcb77b8e2b
+
+
+
diff --git a/graph/incidents_graphml/b/b541ec20-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/b/b541ec20-1411-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea177fddaf5f1caa59162e99f4522a1aa04aeeba
--- /dev/null
+++ b/graph/incidents_graphml/b/b541ec20-1411-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.76
+ 100.64.65.76
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687777678
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b541ec20-1411-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/b/b5447da0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/b5447da0-2ebf-11ee-9131-1117bdeaaaa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12857abc8e38c2385dbd80468028f0f4f058ae97
--- /dev/null
+++ b/graph/incidents_graphml/b/b5447da0-2ebf-11ee-9131-1117bdeaaaa3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.110
+ 100.64.72.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Meraki","Precinct"]
+
+
+ INCIDENT_LINK
+ 1690711141
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5447da0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711141
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5447da0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+
diff --git a/graph/incidents_graphml/b/b54cb910-503f-11ee-b697-c3310c70b120.graphml b/graph/incidents_graphml/b/b54cb910-503f-11ee-b697-c3310c70b120.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d6c4c44e42c6196d1071a273c37c5f597aa74f5
--- /dev/null
+++ b/graph/incidents_graphml/b/b54cb910-503f-11ee-b697-c3310c70b120.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694394504
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b54cb910-503f-11ee-b697-c3310c70b120
+
+
+
diff --git a/graph/incidents_graphml/b/b55773a0-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b55773a0-7bd2-11ee-8fcf-9fbd42a0c461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea23b1eef3eb938443fe4b4883d3d45568a5ca1b
--- /dev/null
+++ b/graph/incidents_graphml/b/b55773a0-7bd2-11ee-8fcf-9fbd42a0c461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.17
+ 100.64.39.17
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699185541
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b55773a0-7bd2-11ee-8fcf-9fbd42a0c461
+
+
+
diff --git a/graph/incidents_graphml/b/b557a740-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b557a740-56c5-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..526d4b007ae5ba3193e6373dd1765840239dd8d2
--- /dev/null
+++ b/graph/incidents_graphml/b/b557a740-56c5-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.192
+ 100.64.75.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666964266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b557a740-56c5-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/b/b55cfe70-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b55cfe70-56c5-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24554e5394efe6e8eba6f34170a625b238d2d263
--- /dev/null
+++ b/graph/incidents_graphml/b/b55cfe70-56c5-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.192
+ 100.64.75.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1666964266
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b55cfe70-56c5-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/b/b55d7200-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b55d7200-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..597164d606281da8da326e7369deb793bd1ecd19
--- /dev/null
+++ b/graph/incidents_graphml/b/b55d7200-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.223
+ 100.64.53.223
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691969996
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b55d7200-3a32-11ee-a0d4-2bfcb77b8e2b
+
+
+
diff --git a/graph/incidents_graphml/b/b55fb120-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b55fb120-3fb2-11ee-b2f5-ad594961d736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..743b3421e03ae4376dba6dbed4becda904da7de7
--- /dev/null
+++ b/graph/incidents_graphml/b/b55fb120-3fb2-11ee-b2f5-ad594961d736.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.163
+ 100.64.18.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692574727
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b55fb120-3fb2-11ee-b2f5-ad594961d736
+
+
+
diff --git a/graph/incidents_graphml/b/b5615fe0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b5615fe0-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99945b051c0e356c3cc90c531119d0c8bd977308
--- /dev/null
+++ b/graph/incidents_graphml/b/b5615fe0-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.166
+ 100.64.53.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854530
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5615fe0-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/b566f7e0-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/b/b566f7e0-6092-11ee-a31b-270f2d0ccd3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..334baaa2ed728e04719c4a7288dd4f77de2e0abf
--- /dev/null
+++ b/graph/incidents_graphml/b/b566f7e0-6092-11ee-a31b-270f2d0ccd3d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.21
+ 100.64.68.21
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1696189371
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b566f7e0-6092-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189371
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b566f7e0-6092-11ee-a31b-270f2d0ccd3d
+
+
+
diff --git a/graph/incidents_graphml/b/b56a6820-21b9-11ee-ad82-796ed23e6009.graphml b/graph/incidents_graphml/b/b56a6820-21b9-11ee-ad82-796ed23e6009.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4afc960a879318b73eb101699c6561206d039aba
--- /dev/null
+++ b/graph/incidents_graphml/b/b56a6820-21b9-11ee-ad82-796ed23e6009.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.177
+ 100.64.23.177
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689279199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b56a6820-21b9-11ee-ad82-796ed23e6009
+
+
+
diff --git a/graph/incidents_graphml/b/b56f4180-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b56f4180-3fb2-11ee-b2f5-ad594961d736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aac154a13ab097a2b3e6b5c2b998a3fe3a2154f4
--- /dev/null
+++ b/graph/incidents_graphml/b/b56f4180-3fb2-11ee-b2f5-ad594961d736.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.163
+ 100.64.18.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692574727
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b56f4180-3fb2-11ee-b2f5-ad594961d736
+
+
+
diff --git a/graph/incidents_graphml/b/b56f69a0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b56f69a0-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c38d2b5d04697ee29078f2f30556b2835dc35ece
--- /dev/null
+++ b/graph/incidents_graphml/b/b56f69a0-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.166
+ 100.64.53.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854530
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b56f69a0-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/b57e8e90-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b57e8e90-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64fd8ee248533049a3699945806da001cda76e6c
--- /dev/null
+++ b/graph/incidents_graphml/b/b57e8e90-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691969996
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b57e8e90-3a32-11ee-a0d4-2bfcb77b8e2b
+
+
+
diff --git a/graph/incidents_graphml/b/b585cf70-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/b/b585cf70-21fe-11ef-a065-0d11f2930c39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f2db6b4e37ef094ea886fc8ca072d92962ca9c5
--- /dev/null
+++ b/graph/incidents_graphml/b/b585cf70-21fe-11ef-a065-0d11f2930c39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.151
+ 100.64.32.151
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717456332
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b585cf70-21fe-11ef-a065-0d11f2930c39
+
+
+
diff --git a/graph/incidents_graphml/b/b5874e70-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/b5874e70-0ebf-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d18d5b433220649372a739ce8b918a4cfc016ee
--- /dev/null
+++ b/graph/incidents_graphml/b/b5874e70-0ebf-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.47
+ 100.64.17.47
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.202
+ 100.64.72.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.18.251
+ 100.64.18.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.29.49
+ 100.64.29.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687192704
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b5874e70-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192704
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b5874e70-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192704
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b5874e70-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192704
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b5874e70-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192704
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b5874e70-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192704
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b5874e70-0ebf-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/b/b587aae0-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/b/b587aae0-056f-11ee-bce7-dffdb32a6ba9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b8cbca808f86b7af5801b9f63cd453e210a2295
--- /dev/null
+++ b/graph/incidents_graphml/b/b587aae0-056f-11ee-bce7-dffdb32a6ba9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.53
+ 100.64.75.53
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.75.54
+ 100.64.75.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686168784
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b587aae0-056f-11ee-bce7-dffdb32a6ba9
+
+
+ INCIDENT_LINK
+ 1686168784
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b587aae0-056f-11ee-bce7-dffdb32a6ba9
+
+
+
diff --git a/graph/incidents_graphml/b/b5883070-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b5883070-24c6-11ee-aa36-6b1924b88a3a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68b60b82af8283bd4ecee38a514c042cf1b6f30a
--- /dev/null
+++ b/graph/incidents_graphml/b/b5883070-24c6-11ee-aa36-6b1924b88a3a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.57
+ 100.64.17.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689614636
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5883070-24c6-11ee-aa36-6b1924b88a3a
+
+
+
diff --git a/graph/incidents_graphml/b/b59fd720-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b59fd720-24c6-11ee-aa36-6b1924b88a3a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13afa33244f4833ef30f58dd10d0adcfca8df3a6
--- /dev/null
+++ b/graph/incidents_graphml/b/b59fd720-24c6-11ee-aa36-6b1924b88a3a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.57
+ 100.64.17.57
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689614636
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b59fd720-24c6-11ee-aa36-6b1924b88a3a
+
+
+
diff --git a/graph/incidents_graphml/b/b5a230e0-9daa-11ed-a07d-2388b6eb4361.graphml b/graph/incidents_graphml/b/b5a230e0-9daa-11ed-a07d-2388b6eb4361.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9444484167373b4a0249ddb27ceb2b16a2435ef1
--- /dev/null
+++ b/graph/incidents_graphml/b/b5a230e0-9daa-11ed-a07d-2388b6eb4361.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.107.156
+ 192.168.107.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.104
+ 100.64.90.104
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674759203
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5a230e0-9daa-11ed-a07d-2388b6eb4361
+
+
+ INCIDENT_LINK
+ 1674759203
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5a230e0-9daa-11ed-a07d-2388b6eb4361
+
+
+
diff --git a/graph/incidents_graphml/b/b5a6d470-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b5a6d470-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..123d1a213ac93f5bf6c5ab02b8efb20679d6ecb6
--- /dev/null
+++ b/graph/incidents_graphml/b/b5a6d470-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.98
+ 100.64.54.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694431871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5a6d470-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/b/b5af3890-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b5af3890-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2bf1149f27c954637da1011777a741b5e01b0037
--- /dev/null
+++ b/graph/incidents_graphml/b/b5af3890-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.86
+ 100.64.33.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758358
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5af3890-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b5b59700-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/b/b5b59700-216e-11ee-9e0b-8dcc0a578b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd9f3caa6262623678709535755aad9291477a2b
--- /dev/null
+++ b/graph/incidents_graphml/b/b5b59700-216e-11ee-9e0b-8dcc0a578b7b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.193.138
+ 192.168.193.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.79.162
+ 100.64.79.162
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.161
+ 100.64.77.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689246987
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5b59700-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246987
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5b59700-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246987
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5b59700-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246987
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5b59700-216e-11ee-9e0b-8dcc0a578b7b
+
+
+
diff --git a/graph/incidents_graphml/b/b5b72820-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b5b72820-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b8746f205d5e90c5d6db3a3c2f358caf393263d
--- /dev/null
+++ b/graph/incidents_graphml/b/b5b72820-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.54.98
+ 100.64.54.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694431871
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b5b72820-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/b/b5bdde90-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b5bdde90-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eac17d257926f3dd64868ce63141fe7e1d5d0721
--- /dev/null
+++ b/graph/incidents_graphml/b/b5bdde90-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.86
+ 100.64.33.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758358
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b5bdde90-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b5c5f530-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b5c5f530-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27b46126224d0ca8f1a945a490f145c0cbae9832
--- /dev/null
+++ b/graph/incidents_graphml/b/b5c5f530-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.125
+ 100.64.85.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694431872
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5c5f530-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/b/b5c81ab0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b5c81ab0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c07338b365f78badcdfa5ff7969ae2d7b9335a1d
--- /dev/null
+++ b/graph/incidents_graphml/b/b5c81ab0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.225
+ 100.64.53.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691969996
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5c81ab0-3a32-11ee-a0d4-2bfcb77b8e2b
+
+
+
diff --git a/graph/incidents_graphml/b/b5d5aca0-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b5d5aca0-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13e761c495a329068f63fd06f5c45047abbe09e2
--- /dev/null
+++ b/graph/incidents_graphml/b/b5d5aca0-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.125
+ 100.64.85.125
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694431872
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b5d5aca0-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/b/b5d88560-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/b5d88560-fe9d-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29477dbadab1e143d42e6c4bb56c1cf83b2f79ec
--- /dev/null
+++ b/graph/incidents_graphml/b/b5d88560-fe9d-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685418883
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5d88560-fe9d-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/b/b5df2d10-5308-11ee-b63c-1beb4899e6f1.graphml b/graph/incidents_graphml/b/b5df2d10-5308-11ee-b63c-1beb4899e6f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b05b035ae9adb6ff9b28288c21231d551900108
--- /dev/null
+++ b/graph/incidents_graphml/b/b5df2d10-5308-11ee-b63c-1beb4899e6f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1694700737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5df2d10-5308-11ee-b63c-1beb4899e6f1
+
+
+
diff --git a/graph/incidents_graphml/b/b5e399e0-5308-11ee-b63c-1beb4899e6f1.graphml b/graph/incidents_graphml/b/b5e399e0-5308-11ee-b63c-1beb4899e6f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c29fce231eae8f5d4cae9ce0654a02ccd1a5305d
--- /dev/null
+++ b/graph/incidents_graphml/b/b5e399e0-5308-11ee-b63c-1beb4899e6f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.202
+ 100.64.69.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1694700737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5e399e0-5308-11ee-b63c-1beb4899e6f1
+
+
+
diff --git a/graph/incidents_graphml/b/b5e7ae70-21b9-11ee-ad82-796ed23e6009.graphml b/graph/incidents_graphml/b/b5e7ae70-21b9-11ee-ad82-796ed23e6009.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb34c8c7ab3a29ee88be919255dba6bcf7171c4a
--- /dev/null
+++ b/graph/incidents_graphml/b/b5e7ae70-21b9-11ee-ad82-796ed23e6009.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.64
+ 100.64.4.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689279200
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b5e7ae70-21b9-11ee-ad82-796ed23e6009
+
+
+
diff --git a/graph/incidents_graphml/b/b5f4a740-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b5f4a740-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8424db5a20df398d7332ebc09c57cac81861bbde
--- /dev/null
+++ b/graph/incidents_graphml/b/b5f4a740-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.170
+ 100.64.94.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694242893
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b5f4a740-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/b/b5f89900-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b5f89900-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..127c375a86a78ebeb68631d339895920d0bad56c
--- /dev/null
+++ b/graph/incidents_graphml/b/b5f89900-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.132
+ 100.64.15.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740022
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b5f89900-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b5fd34e0-39b8-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/b/b5fd34e0-39b8-11ee-84c9-adc60bfa2a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d25c9574663af092c73d699f13a09901583e3eed
--- /dev/null
+++ b/graph/incidents_graphml/b/b5fd34e0-39b8-11ee-84c9-adc60bfa2a04.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.43.19
+ 192.168.43.19
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.30
+ USER-0015-2164.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5fd34e0-39b8-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b5fd34e0-39b8-11ee-84c9-adc60bfa2a04
+
+
+
diff --git a/graph/incidents_graphml/b/b5ff5c40-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b5ff5c40-24c6-11ee-aa36-6b1924b88a3a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..636552c7b090366a1fbfe804d95ed749cae2fa65
--- /dev/null
+++ b/graph/incidents_graphml/b/b5ff5c40-24c6-11ee-aa36-6b1924b88a3a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.59
+ 100.64.17.59
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689614637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b5ff5c40-24c6-11ee-aa36-6b1924b88a3a
+
+
+
diff --git a/graph/incidents_graphml/b/b60a4450-dfa8-11ee-806c-c9cebb5c20a7.graphml b/graph/incidents_graphml/b/b60a4450-dfa8-11ee-806c-c9cebb5c20a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b23a82dcd0dc487adfbc207c9fa5f82d9f13605f
--- /dev/null
+++ b/graph/incidents_graphml/b/b60a4450-dfa8-11ee-806c-c9cebb5c20a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.5
+ 100.64.44.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710162619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b60a4450-dfa8-11ee-806c-c9cebb5c20a7
+
+
+
diff --git a/graph/incidents_graphml/b/b60d31c0-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b60d31c0-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ab0ce7201a04a0af217d61bd6d60e3a01f1d57d
--- /dev/null
+++ b/graph/incidents_graphml/b/b60d31c0-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.54
+ 100.64.12.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028873
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b60d31c0-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b60e9200-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b60e9200-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ebfd4603cc320dbb35bfefb21db695af3a3b53d
--- /dev/null
+++ b/graph/incidents_graphml/b/b60e9200-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.134
+ 100.64.15.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740022
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b60e9200-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b61443d0-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b61443d0-24c6-11ee-aa36-6b1924b88a3a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d5505b9697a27d6a290a2faf63356ae99362454
--- /dev/null
+++ b/graph/incidents_graphml/b/b61443d0-24c6-11ee-aa36-6b1924b88a3a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.59
+ 100.64.17.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689614637
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b61443d0-24c6-11ee-aa36-6b1924b88a3a
+
+
+
diff --git a/graph/incidents_graphml/b/b616d760-39b8-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/b/b616d760-39b8-11ee-84c9-adc60bfa2a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8979a92fd7b2457eb6f2a2eab924e8d2f0584029
--- /dev/null
+++ b/graph/incidents_graphml/b/b616d760-39b8-11ee-84c9-adc60bfa2a04.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.37.13
+ 172.30.37.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.116
+ 100.64.90.116
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.74
+ 100.64.91.74
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.119.136
+ 172.29.119.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b616d760-39b8-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b616d760-39b8-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b616d760-39b8-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b616d760-39b8-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b616d760-39b8-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b616d760-39b8-11ee-84c9-adc60bfa2a04
+
+
+
diff --git a/graph/incidents_graphml/b/b61cc2d0-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b61cc2d0-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60a4bfc8296cc3e86c3a7664c2972a250c260a9f
--- /dev/null
+++ b/graph/incidents_graphml/b/b61cc2d0-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.136
+ 100.64.15.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740022
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b61cc2d0-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b624aa20-dfa8-11ee-806c-c9cebb5c20a7.graphml b/graph/incidents_graphml/b/b624aa20-dfa8-11ee-806c-c9cebb5c20a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d90d776860c61773e2ec8adcf4ce855b8c0c824
--- /dev/null
+++ b/graph/incidents_graphml/b/b624aa20-dfa8-11ee-806c-c9cebb5c20a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.5
+ 100.64.44.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710162619
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b624aa20-dfa8-11ee-806c-c9cebb5c20a7
+
+
+
diff --git a/graph/incidents_graphml/b/b62c5330-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b62c5330-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b770eff78640c236f1cf61b4d0d796b16484eef
--- /dev/null
+++ b/graph/incidents_graphml/b/b62c5330-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.136
+ 100.64.15.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740022
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b62c5330-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b62d1e80-39b8-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/b/b62d1e80-39b8-11ee-84c9-adc60bfa2a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b43744d88e0bac31e1302c63d24cc2491214d627
--- /dev/null
+++ b/graph/incidents_graphml/b/b62d1e80-39b8-11ee-84c9-adc60bfa2a04.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.162.137
+ 172.21.162.137
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.32
+ 100.64.97.32
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b62d1e80-39b8-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917598
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b62d1e80-39b8-11ee-84c9-adc60bfa2a04
+
+
+
diff --git a/graph/incidents_graphml/b/b638fe30-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b638fe30-39e0-11ee-b92b-37d2cd449a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56f9e5b00f58c12523f5197f522444355d985200
--- /dev/null
+++ b/graph/incidents_graphml/b/b638fe30-39e0-11ee-b92b-37d2cd449a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.199
+ 100.64.45.199
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691934778
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b638fe30-39e0-11ee-b92b-37d2cd449a32
+
+
+
diff --git a/graph/incidents_graphml/b/b6394640-317b-11ef-a44c-8dd6e254532a.graphml b/graph/incidents_graphml/b/b6394640-317b-11ef-a44c-8dd6e254532a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4314bef665799ea00c98c16368ebff7413dbcf05
--- /dev/null
+++ b/graph/incidents_graphml/b/b6394640-317b-11ef-a44c-8dd6e254532a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.242
+ 100.64.86.242
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719159288
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6394640-317b-11ef-a44c-8dd6e254532a
+
+
+
diff --git a/graph/incidents_graphml/b/b63a62d0-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b63a62d0-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c66d699d30fde7330399d45dedad3803146540e
--- /dev/null
+++ b/graph/incidents_graphml/b/b63a62d0-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.172
+ 100.64.94.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694242894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b63a62d0-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/b/b63aa8e0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b63aa8e0-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cc968abf58696356f0f6bd160751e0d777dbac6
--- /dev/null
+++ b/graph/incidents_graphml/b/b63aa8e0-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.167
+ 100.64.53.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854532
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b63aa8e0-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/b6481660-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b6481660-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4636d1b8202a558f1dc265b1f723ee8313010353
--- /dev/null
+++ b/graph/incidents_graphml/b/b6481660-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.167
+ 100.64.53.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854532
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6481660-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/b64c3d20-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b64c3d20-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99e638ce5da5a29ee5f50fa8e36b940fcbb98160
--- /dev/null
+++ b/graph/incidents_graphml/b/b64c3d20-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.172
+ 100.64.94.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694242894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b64c3d20-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/b/b6505740-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b6505740-75ab-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da748f166335c43ff870806651961197635320e2
--- /dev/null
+++ b/graph/incidents_graphml/b/b6505740-75ab-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.13
+ 100.64.33.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698509085
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6505740-75ab-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/b/b6539620-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/b/b6539620-3150-11ee-9a81-45e5b946e7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3583f724813c18af627982643d822f3bacd9a04e
--- /dev/null
+++ b/graph/incidents_graphml/b/b6539620-3150-11ee-9a81-45e5b946e7a5.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.88
+ 100.64.9.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.89
+ 100.64.9.89
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.90
+ 100.64.9.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.91
+ 100.64.9.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.92
+ 100.64.9.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.93
+ 100.64.9.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.94
+ 100.64.9.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.95
+ 100.64.9.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.96
+ 100.64.9.96
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.97
+ 100.64.9.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.98
+ 100.64.9.98
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.99
+ 100.64.9.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.101
+ 100.64.9.101
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.102
+ 100.64.9.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993322
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6539620-3150-11ee-9a81-45e5b946e7a5
+
+
+
diff --git a/graph/incidents_graphml/b/b659aaa0-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b659aaa0-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d527416e3f418801a8542d0b3e748fa5d9ea702
--- /dev/null
+++ b/graph/incidents_graphml/b/b659aaa0-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.173
+ 100.64.94.173
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694242894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b659aaa0-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/b/b65f9980-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b65f9980-75ab-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63a08d05a6a107cb7b18ca7c59e0f93784b71b42
--- /dev/null
+++ b/graph/incidents_graphml/b/b65f9980-75ab-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.13
+ 100.64.33.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698509085
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b65f9980-75ab-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/b/b666c800-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b666c800-a1f6-11ee-8be4-0756a5149684.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d7dd8419b2912e8a4888ec3730a64eda4eff629
--- /dev/null
+++ b/graph/incidents_graphml/b/b666c800-a1f6-11ee-8be4-0756a5149684.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.131
+ 100.64.62.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379149
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b666c800-a1f6-11ee-8be4-0756a5149684
+
+
+
diff --git a/graph/incidents_graphml/b/b666ec00-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b666ec00-39e0-11ee-b92b-37d2cd449a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81829f6b02b6ffaf8905530fac8a194046ffddca
--- /dev/null
+++ b/graph/incidents_graphml/b/b666ec00-39e0-11ee-b92b-37d2cd449a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.201
+ 100.64.45.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691934779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b666ec00-39e0-11ee-b92b-37d2cd449a32
+
+
+
diff --git a/graph/incidents_graphml/b/b6672bb0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/b6672bb0-2ebf-11ee-9131-1117bdeaaaa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..330ed87ca015041c7dad492fa6e7af188a45a259
--- /dev/null
+++ b/graph/incidents_graphml/b/b6672bb0-2ebf-11ee-9131-1117bdeaaaa3.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.66.225
+ 100.64.66.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.111
+ 100.64.72.111
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.112
+ 100.64.72.112
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690711143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6672bb0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6672bb0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6672bb0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6672bb0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6672bb0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6672bb0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6672bb0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6672bb0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+
diff --git a/graph/incidents_graphml/b/b6693b00-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b6693b00-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5c7b4691e4e33a354628415500ffee0bc8f2cfb
--- /dev/null
+++ b/graph/incidents_graphml/b/b6693b00-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.173
+ 100.64.94.173
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694242894
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6693b00-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/b/b6763150-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b6763150-a1f6-11ee-8be4-0756a5149684.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed67106880661edc9e4a79093917bf1bcb4d9b3e
--- /dev/null
+++ b/graph/incidents_graphml/b/b6763150-a1f6-11ee-8be4-0756a5149684.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.131
+ 100.64.62.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379149
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6763150-a1f6-11ee-8be4-0756a5149684
+
+
+
diff --git a/graph/incidents_graphml/b/b6765a60-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b6765a60-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2116acbc0a8a16c4fee0048ca54399f44dc817df
--- /dev/null
+++ b/graph/incidents_graphml/b/b6765a60-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.176
+ 100.64.94.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1694242894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6765a60-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/b/b68611d0-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b68611d0-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2413e7130c096ef095a430ffc01ea6825d50fa97
--- /dev/null
+++ b/graph/incidents_graphml/b/b68611d0-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.176
+ 100.64.94.176
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694242894
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b68611d0-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/b/b689d740-317b-11ef-a44c-8dd6e254532a.graphml b/graph/incidents_graphml/b/b689d740-317b-11ef-a44c-8dd6e254532a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c7dfaa1f6ea05a7dd0abdcfb30beb740fa2aee5
--- /dev/null
+++ b/graph/incidents_graphml/b/b689d740-317b-11ef-a44c-8dd6e254532a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ USER-0015-1979.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.244
+ USER-0015-1996.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719159288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b689d740-317b-11ef-a44c-8dd6e254532a
+
+
+
diff --git a/graph/incidents_graphml/b/b68b6810-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b68b6810-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..227ba818e0d8a8bf285dc423cf75789d1f724cd0
--- /dev/null
+++ b/graph/incidents_graphml/b/b68b6810-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,641 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.127
+ 100.64.85.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.128
+ 100.64.85.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.129
+ 100.64.85.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.130
+ 100.64.85.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.69
+ 100.64.4.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.131
+ 100.64.85.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.132
+ 100.64.85.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.149
+ 100.64.3.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.133
+ 100.64.85.133
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.134
+ 100.64.85.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.135
+ 100.64.85.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.136
+ 100.64.85.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.137
+ HOST-17035
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.30
+ 100.64.18.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.23.231
+ 100.64.23.231
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.209
+ 100.64.18.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.138
+ 100.64.85.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.139
+ 100.64.85.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68b6810-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/b/b68c9c70-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b68c9c70-39e0-11ee-b92b-37d2cd449a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef66cf8f13ef08d521181ee3c5f6821ec00ad551
--- /dev/null
+++ b/graph/incidents_graphml/b/b68c9c70-39e0-11ee-b92b-37d2cd449a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.201
+ 100.64.45.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691934779
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b68c9c70-39e0-11ee-b92b-37d2cd449a32
+
+
+
diff --git a/graph/incidents_graphml/b/b68ebf50-8ce2-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/b/b68ebf50-8ce2-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..374a8666c53ea6e1d472891711de971d5966129d
--- /dev/null
+++ b/graph/incidents_graphml/b/b68ebf50-8ce2-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.76
+ 100.64.59.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701061584
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b68ebf50-8ce2-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/b/b691c380-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b691c380-de41-11ed-8036-d144f5e7f2f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..400e7458f03b04ca3bdf7690e8cac0cba2fb8849
--- /dev/null
+++ b/graph/incidents_graphml/b/b691c380-de41-11ed-8036-d144f5e7f2f2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.107
+ 100.64.78.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.78.108
+ 100.64.78.108
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b691c380-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b691c380-de41-11ed-8036-d144f5e7f2f2
+
+
+
diff --git a/graph/incidents_graphml/b/b6934a20-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b6934a20-de41-11ed-8036-d144f5e7f2f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae045a070eee7313b626a672f1d75668a1a0d1ef
--- /dev/null
+++ b/graph/incidents_graphml/b/b6934a20-de41-11ed-8036-d144f5e7f2f2.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.109
+ 100.64.78.109
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.180
+ 100.64.71.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.78.110
+ 100.64.78.110
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.39.105
+ 100.64.39.105
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.78.111
+ 100.64.78.111
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.112
+ 100.64.78.112
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.40
+ 100.64.73.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.78.113
+ 100.64.78.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.228
+ 100.64.71.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6934a20-de41-11ed-8036-d144f5e7f2f2
+
+
+
diff --git a/graph/incidents_graphml/b/b6994520-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b6994520-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68c98f7fd19bdc9d76cd84d94525ea0aa679a8c0
--- /dev/null
+++ b/graph/incidents_graphml/b/b6994520-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6994520-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b69971d0-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b69971d0-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3998c82175c7d15bbe609f727c2cf81e925a74b4
--- /dev/null
+++ b/graph/incidents_graphml/b/b69971d0-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.127
+ 100.64.85.127
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.156
+ 100.64.85.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 100.64.85.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.184
+ 100.64.5.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.40
+ 100.64.11.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.158
+ 100.64.85.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.206
+ 100.64.58.206
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.159
+ 100.64.85.159
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.161
+ 100.64.20.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.160
+ 100.64.85.160
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.161
+ 100.64.85.161
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.162
+ 100.64.85.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.121
+ 100.64.43.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.163
+ 100.64.85.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.119
+ 100.64.8.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.184
+ 100.64.41.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.215
+ USER-0015-1236.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.164
+ 100.64.85.164
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.165
+ 100.64.85.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.243
+ 100.64.13.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.166
+ 100.64.85.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b69971d0-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/b/b69dda80-8ce2-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/b/b69dda80-8ce2-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6df9d13eacc11de3536e438e634d03ba13c4c57d
--- /dev/null
+++ b/graph/incidents_graphml/b/b69dda80-8ce2-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.76
+ 100.64.59.76
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701061585
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b69dda80-8ce2-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/b/b6a07660-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b6a07660-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d53064a4806b62a66bcdd13554ff9bd9a3773f65
--- /dev/null
+++ b/graph/incidents_graphml/b/b6a07660-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.204
+ 100.64.36.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6a07660-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b6a0c0f0-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/b6a0c0f0-95ae-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e4636da30e553bd7ca0e62c8533fbb6da319fd8
--- /dev/null
+++ b/graph/incidents_graphml/b/b6a0c0f0-95ae-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.234
+ 100.64.75.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1673881313
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6a0c0f0-95ae-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673881313
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6a0c0f0-95ae-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/b/b6a487f0-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/b6a487f0-fe9d-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2c7f15d776c3f76456388be5833f1ea942ecbf1
--- /dev/null
+++ b/graph/incidents_graphml/b/b6a487f0-fe9d-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.174
+ 100.64.13.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685418884
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6a487f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418884
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6a487f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/b/b6a7aa10-a060-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/b/b6a7aa10-a060-11ee-9181-41cbe26a7b16.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38d7a69919baa0197a2f36978d599fca5fc0ef52
--- /dev/null
+++ b/graph/incidents_graphml/b/b6a7aa10-a060-11ee-9181-41cbe26a7b16.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.230
+ 100.64.14.230
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1703204773
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6a7aa10-a060-11ee-9181-41cbe26a7b16
+
+
+ INCIDENT_LINK
+ 1703204773
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6a7aa10-a060-11ee-9181-41cbe26a7b16
+
+
+
diff --git a/graph/incidents_graphml/b/b6ab4680-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b6ab4680-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5714a4779b3bc6cb0526d31a4f3849067515161
--- /dev/null
+++ b/graph/incidents_graphml/b/b6ab4680-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b6ab4680-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b6afb8a0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b6afb8a0-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c69b67cc8d604731e931b0b4b0e0cf14f2cd08ec
--- /dev/null
+++ b/graph/incidents_graphml/b/b6afb8a0-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.204
+ 100.64.36.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758360
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6afb8a0-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b6afd5d0-317b-11ef-a44c-8dd6e254532a.graphml b/graph/incidents_graphml/b/b6afd5d0-317b-11ef-a44c-8dd6e254532a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09bcfe85544e20ee923080825d59d33faa645a7f
--- /dev/null
+++ b/graph/incidents_graphml/b/b6afd5d0-317b-11ef-a44c-8dd6e254532a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.46.208
+ USER-0015-1982.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.247
+ USER-0015-1997.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719159288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6afd5d0-317b-11ef-a44c-8dd6e254532a
+
+
+
diff --git a/graph/incidents_graphml/b/b6b02930-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b6b02930-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..136d8b47639cefc28144cad03f5a42e7eeb98c67
--- /dev/null
+++ b/graph/incidents_graphml/b/b6b02930-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.138
+ 100.64.15.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740023
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6b02930-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b6b2b430-cff7-11ed-b87d-e343a0a76f13.graphml b/graph/incidents_graphml/b/b6b2b430-cff7-11ed-b87d-e343a0a76f13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f0e85643da0bd97bd991e090c0fc0857e886262
--- /dev/null
+++ b/graph/incidents_graphml/b/b6b2b430-cff7-11ed-b87d-e343a0a76f13.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.255
+ 100.64.68.255
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1680289834
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6b2b430-cff7-11ed-b87d-e343a0a76f13
+
+
+
diff --git a/graph/incidents_graphml/b/b6b3b090-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b6b3b090-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..759d0cb62a8c5f8e5d3ec1320cf2ce80e44f6232
--- /dev/null
+++ b/graph/incidents_graphml/b/b6b3b090-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.136
+ 100.64.85.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694431873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6b3b090-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/b/b6bef640-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b6bef640-80dd-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88fc6bcf5b740ff92a267a60a89415ea4c3bbcc4
--- /dev/null
+++ b/graph/incidents_graphml/b/b6bef640-80dd-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.138
+ 100.64.15.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699740023
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6bef640-80dd-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/b/b6bfe540-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b6bfe540-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..834a22fe6846aab1eb25f3295b06e9f1e536d24c
--- /dev/null
+++ b/graph/incidents_graphml/b/b6bfe540-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.184
+ 100.64.17.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6bfe540-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b6c0a340-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b6c0a340-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7440411057c33bc883a434b531c4831ff915b94c
--- /dev/null
+++ b/graph/incidents_graphml/b/b6c0a340-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.189
+ 100.64.12.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028874
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6c0a340-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b6cfc3c0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b6cfc3c0-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d9a08a50258e8b991b87a9dc9917bf35fe25035
--- /dev/null
+++ b/graph/incidents_graphml/b/b6cfc3c0-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.184
+ 100.64.17.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758360
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b6cfc3c0-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b6d5be30-435f-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/b/b6d5be30-435f-11ef-9e66-fd84d5bf3736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1aaa88066ceaa3367129fb197d49fc7576f082a0
--- /dev/null
+++ b/graph/incidents_graphml/b/b6d5be30-435f-11ef-9e66-fd84d5bf3736.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.241
+ 100.64.5.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.81
+ 100.64.28.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.82
+ 100.64.28.82
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.83
+ 100.64.28.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6d5be30-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6d5be30-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6d5be30-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6d5be30-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6d5be30-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6d5be30-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6d5be30-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6d5be30-435f-11ef-9e66-fd84d5bf3736
+
+
+
diff --git a/graph/incidents_graphml/b/b6efaed0-435f-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/b/b6efaed0-435f-11ef-9e66-fd84d5bf3736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37f23c945d1badbbcc70c72123ad8f85f07022d7
--- /dev/null
+++ b/graph/incidents_graphml/b/b6efaed0-435f-11ef-9e66-fd84d5bf3736.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.87
+ 100.64.28.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.200
+ 100.64.2.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.88
+ 100.64.28.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6efaed0-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6efaed0-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6efaed0-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6efaed0-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6efaed0-435f-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126384
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6efaed0-435f-11ef-9e66-fd84d5bf3736
+
+
+
diff --git a/graph/incidents_graphml/b/b6efec10-317b-11ef-a44c-8dd6e254532a.graphml b/graph/incidents_graphml/b/b6efec10-317b-11ef-a44c-8dd6e254532a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..445e1c3a03ca5dcb7886cd2d7dde86ac826ac3d8
--- /dev/null
+++ b/graph/incidents_graphml/b/b6efec10-317b-11ef-a44c-8dd6e254532a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ USER-0015-1979.example.internal
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.246
+ USER-0015-1998.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719159289
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6efec10-317b-11ef-a44c-8dd6e254532a
+
+
+
diff --git a/graph/incidents_graphml/b/b6eff220-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b6eff220-39e0-11ee-b92b-37d2cd449a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9899e7fc256fb244bb261112aac3afcec250d3b8
--- /dev/null
+++ b/graph/incidents_graphml/b/b6eff220-39e0-11ee-b92b-37d2cd449a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.203
+ 100.64.45.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691934780
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6eff220-39e0-11ee-b92b-37d2cd449a32
+
+
+
diff --git a/graph/incidents_graphml/b/b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/b/b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a83854eb981d2e7570a05a0444d951200f0fb586
--- /dev/null
+++ b/graph/incidents_graphml/b/b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.11.138
+ 172.22.11.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.92.71
+ 100.64.92.71
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.175
+ 100.64.86.175
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.154
+ 100.64.95.154
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.1.246
+ 100.64.1.246
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.34
+ 100.64.89.34
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/b/b6ff6ee0-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/b/b6ff6ee0-9773-11ed-8e25-218966643970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bf9cfb125677ca835eeafe9e26e23e554613281
--- /dev/null
+++ b/graph/incidents_graphml/b/b6ff6ee0-9773-11ed-8e25-218966643970.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.184
+ 100.64.34.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.161
+ 100.64.72.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1674075876
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6ff6ee0-9773-11ed-8e25-218966643970
+
+
+ INCIDENT_LINK
+ 1674075876
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b6ff6ee0-9773-11ed-8e25-218966643970
+
+
+
diff --git a/graph/incidents_graphml/b/b6ffb1f0-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b6ffb1f0-56c5-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c42f3db6bb9f5b16be0c5a8264d3aad08d7196d1
--- /dev/null
+++ b/graph/incidents_graphml/b/b6ffb1f0-56c5-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.79
+ 100.64.27.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.30
+ 100.64.74.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666964269
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b6ffb1f0-56c5-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/b/b70332e0-029b-11ed-9608-918c8d74993e.graphml b/graph/incidents_graphml/b/b70332e0-029b-11ed-9608-918c8d74993e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75c25f29e08579eb8066644ce1c843174fbaedf3
--- /dev/null
+++ b/graph/incidents_graphml/b/b70332e0-029b-11ed-9608-918c8d74993e.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.68
+ 100.64.80.68
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.228
+ 100.64.71.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657710333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70332e0-029b-11ed-9608-918c8d74993e
+
+
+ INCIDENT_LINK
+ 1657710333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70332e0-029b-11ed-9608-918c8d74993e
+
+
+ INCIDENT_LINK
+ 1657710333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70332e0-029b-11ed-9608-918c8d74993e
+
+
+
diff --git a/graph/incidents_graphml/b/b70460e0-076a-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/b/b70460e0-076a-11ef-93a8-d78cfa287885.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1de9fdbdd93d22f1e1cbe921a6b2d0653c437dd
--- /dev/null
+++ b/graph/incidents_graphml/b/b70460e0-076a-11ef-93a8-d78cfa287885.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.94.5
+ 100.64.94.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714534039
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b70460e0-076a-11ef-93a8-d78cfa287885
+
+
+
diff --git a/graph/incidents_graphml/b/b70e2810-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/b/b70e2810-182c-11ee-b591-f5bec484f8bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f645cdc3dffcc2c343f68fda85f9018e24dc1a0
--- /dev/null
+++ b/graph/incidents_graphml/b/b70e2810-182c-11ee-b591-f5bec484f8bc.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.24.137
+ USER-0015-1650.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.73
+ 100.64.73.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b70e2810-182c-11ee-b591-f5bec484f8bc
+
+
+
diff --git a/graph/incidents_graphml/b/b7157650-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b7157650-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f81c21473174890ad32235039099afcb42b019b5
--- /dev/null
+++ b/graph/incidents_graphml/b/b7157650-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.239
+ 100.64.46.239
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915979
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7157650-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b721fba0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b721fba0-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9d51fb854d27e6b16aeba1a240a96e51279f508
--- /dev/null
+++ b/graph/incidents_graphml/b/b721fba0-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.169
+ 100.64.53.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b721fba0-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/b72b2130-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b72b2130-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb35808e13f98deee6a6f367dc8027f2ec497f05
--- /dev/null
+++ b/graph/incidents_graphml/b/b72b2130-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.144
+ 100.64.12.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915979
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b72b2130-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b72c6b00-503e-11ee-b697-c3310c70b120.graphml b/graph/incidents_graphml/b/b72c6b00-503e-11ee-b697-c3310c70b120.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8f972687a14256ac0bee4c0223ca22c77679677
--- /dev/null
+++ b/graph/incidents_graphml/b/b72c6b00-503e-11ee-b697-c3310c70b120.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.100
+ 100.64.21.100
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.16.182
+ 100.64.16.182
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.65.26
+ 100.64.65.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1694394078
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b72c6b00-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394078
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b72c6b00-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394078
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b72c6b00-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394078
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b72c6b00-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394078
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b72c6b00-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394078
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b72c6b00-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394078
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b72c6b00-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394078
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b72c6b00-503e-11ee-b697-c3310c70b120
+
+
+
diff --git a/graph/incidents_graphml/b/b7300560-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b7300560-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61c2b66b0638f99885d2b37f07eba060b85d9f5a
--- /dev/null
+++ b/graph/incidents_graphml/b/b7300560-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.169
+ 100.64.53.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854533
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7300560-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/b7310710-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b7310710-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8674fe30ae399346ca3105f2737fabf1183906bd
--- /dev/null
+++ b/graph/incidents_graphml/b/b7310710-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.18
+ 100.64.43.18
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909045
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7310710-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b7339da0-adc1-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/b/b7339da0-adc1-11ed-a9cd-bdbbd3b810c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe567722a982c900fbab85b54eeea4afc835e3d7
--- /dev/null
+++ b/graph/incidents_graphml/b/b7339da0-adc1-11ed-a9cd-bdbbd3b810c7.graphml
@@ -0,0 +1,141 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.230.142.18
+ 10.230.142.18
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","AWS VPC Security","Windows Logs"]
+
+
+ HOST
+ 10.211.95.143
+ 10.211.95.143
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.175.170.193
+ 10.175.170.193
+ ["Exploiting Target"]
+ 0.7890625
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676528303
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7339da0-adc1-11ed-a9cd-bdbbd3b810c7
+
+
+ INCIDENT_LINK
+ 1676528303
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7339da0-adc1-11ed-a9cd-bdbbd3b810c7
+
+
+ INCIDENT_LINK
+ 1676528303
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7339da0-adc1-11ed-a9cd-bdbbd3b810c7
+
+
+ INCIDENT_LINK
+ 1676528303
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7339da0-adc1-11ed-a9cd-bdbbd3b810c7
+
+
+ INCIDENT_LINK
+ 1676528303
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7339da0-adc1-11ed-a9cd-bdbbd3b810c7
+
+
+ INCIDENT_LINK
+ 1676528303
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7339da0-adc1-11ed-a9cd-bdbbd3b810c7
+
+
+
diff --git a/graph/incidents_graphml/b/b73d7820-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/b/b73d7820-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..626b8e27604c3085e3f115e7a53aa5c733c24767
--- /dev/null
+++ b/graph/incidents_graphml/b/b73d7820-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.72
+ 100.64.22.72
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b73d7820-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/b/b7416c00-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b7416c00-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29bd26f2718cccfacfaee93f3800a55350034e3d
--- /dev/null
+++ b/graph/incidents_graphml/b/b7416c00-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.40
+ 100.64.37.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028875
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7416c00-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b741cff0-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b741cff0-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f14fd1f6ffe759807b15463c0895429f69726ca
--- /dev/null
+++ b/graph/incidents_graphml/b/b741cff0-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.20
+ 100.64.43.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909045
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b741cff0-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b742f120-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b742f120-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87fb432163a3f63f11ed51fc7ad650065b502c1c
--- /dev/null
+++ b/graph/incidents_graphml/b/b742f120-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.173
+ 100.64.53.173
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854534
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b742f120-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/b7470da0-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b7470da0-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1be0fae7e1c71b8f0fded2b2f2421ae11f6e72b
--- /dev/null
+++ b/graph/incidents_graphml/b/b7470da0-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.144
+ 100.64.12.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915979
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7470da0-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b747cc80-a33a-11ed-a505-7f4e35fde98f.graphml b/graph/incidents_graphml/b/b747cc80-a33a-11ed-a505-7f4e35fde98f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17dbcd95496ab481042202e1496ad47296001dff
--- /dev/null
+++ b/graph/incidents_graphml/b/b747cc80-a33a-11ed-a505-7f4e35fde98f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.198.2382
+ 192.168.198.2382
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki"]
+
+
+ HOST
+ 100.64.73.198
+ 100.64.73.198
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki"]
+
+
+ INCIDENT_LINK
+ 1675370809
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b747cc80-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370809
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b747cc80-a33a-11ed-a505-7f4e35fde98f
+
+
+
diff --git a/graph/incidents_graphml/b/b74a8c70-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/b74a8c70-ebef-11ec-9679-75d3d6184114.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a53ad915c02f9bfe4896548ab90ff302c5ad9531
--- /dev/null
+++ b/graph/incidents_graphml/b/b74a8c70-ebef-11ec-9679-75d3d6184114.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.18
+ 100.64.5.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655217534
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b74a8c70-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217534
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b74a8c70-ebef-11ec-9679-75d3d6184114
+
+
+
diff --git a/graph/incidents_graphml/b/b74b33c0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/b/b74b33c0-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..460ebd3bc7b90fe135e353fbfd235f66443b54aa
--- /dev/null
+++ b/graph/incidents_graphml/b/b74b33c0-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.22.72
+ 100.64.22.72
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700587
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b74b33c0-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/b/b74e3a70-36e6-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/b/b74e3a70-36e6-11ef-997a-f7dc07e23a4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3cb2878e1864d6fc60bf2c0e9da790a2a13f35e
--- /dev/null
+++ b/graph/incidents_graphml/b/b74e3a70-36e6-11ef-997a-f7dc07e23a4a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.22
+ 100.64.6.22
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719755001
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b74e3a70-36e6-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755001
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b74e3a70-36e6-11ef-997a-f7dc07e23a4a
+
+
+
diff --git a/graph/incidents_graphml/b/b74f0210-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b74f0210-39e0-11ee-b92b-37d2cd449a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b33c2a728e0ff1d99eea51701abecf87dacbe67
--- /dev/null
+++ b/graph/incidents_graphml/b/b74f0210-39e0-11ee-b92b-37d2cd449a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.10
+ 100.64.37.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691934780
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b74f0210-39e0-11ee-b92b-37d2cd449a32
+
+
+
diff --git a/graph/incidents_graphml/b/b751fc90-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b751fc90-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2453ffa44b0d63373439f940450afc5d66299189
--- /dev/null
+++ b/graph/incidents_graphml/b/b751fc90-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.20
+ 100.64.43.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909045
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b751fc90-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b752f830-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b752f830-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04a015e73c16fa332eb74d4a281fcb65eba2e293
--- /dev/null
+++ b/graph/incidents_graphml/b/b752f830-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.40
+ 100.64.37.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028875
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b752f830-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b7675120-503e-11ee-b697-c3310c70b120.graphml b/graph/incidents_graphml/b/b7675120-503e-11ee-b697-c3310c70b120.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c83ae918f6826bd010eecdbf2c1f2aec49e33e4
--- /dev/null
+++ b/graph/incidents_graphml/b/b7675120-503e-11ee-b697-c3310c70b120.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.19.45
+ 100.64.19.45
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694394079
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7675120-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394079
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7675120-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394079
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7675120-503e-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394079
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7675120-503e-11ee-b697-c3310c70b120
+
+
+
diff --git a/graph/incidents_graphml/b/b7679b60-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/b/b7679b60-0cf7-11ee-aa7f-c3325e1e3407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9214fa739e89671b16e7e61c561bcdf7b0acaeee
--- /dev/null
+++ b/graph/incidents_graphml/b/b7679b60-0cf7-11ee-aa7f-c3325e1e3407.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.66
+ 100.64.75.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 192.168.87.65
+ 192.168.87.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686996856
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7679b60-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996856
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7679b60-0cf7-11ee-aa7f-c3325e1e3407
+
+
+
diff --git a/graph/incidents_graphml/b/b76ee9f0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b76ee9f0-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f35ad7b45d7644de126b7bcf6e07caa3730e532e
--- /dev/null
+++ b/graph/incidents_graphml/b/b76ee9f0-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.128
+ 100.64.3.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758361
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b76ee9f0-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b77cf3b0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b77cf3b0-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9b5a4add3bc14880923b22c528ea0029c6c596c
--- /dev/null
+++ b/graph/incidents_graphml/b/b77cf3b0-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.128
+ 100.64.3.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758361
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b77cf3b0-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b78c0ee0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b78c0ee0-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77f07dfe7e093938e8631b64e54e4162c151ac15
--- /dev/null
+++ b/graph/incidents_graphml/b/b78c0ee0-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.110
+ USER-0015-1308.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758361
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b78c0ee0-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b79ab4e0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b79ab4e0-8a20-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..191f5f21c22f1c45e6879200bbce51fc2231452e
--- /dev/null
+++ b/graph/incidents_graphml/b/b79ab4e0-8a20-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.208
+ 100.64.36.208
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700758361
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b79ab4e0-8a20-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/b/b7a470e0-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/b/b7a470e0-1c9b-11ee-baac-abb351177483.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec9d8c83ade72c46161b77208ec8c4964887b4ca
--- /dev/null
+++ b/graph/incidents_graphml/b/b7a470e0-1c9b-11ee-baac-abb351177483.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.72
+ 100.64.35.72
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688716562
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7a470e0-1c9b-11ee-baac-abb351177483
+
+
+
diff --git a/graph/incidents_graphml/b/b7a68530-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b7a68530-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f3572ae097affcd6fe3cf79df51c539aa25a000
--- /dev/null
+++ b/graph/incidents_graphml/b/b7a68530-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.152
+ 100.64.25.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909046
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7a68530-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b7aaa660-70e5-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/b/b7aaa660-70e5-11ee-adf7-3be9df66b766.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0ed5018c8f2d69136ab50aaf6bd30a23113dab6
--- /dev/null
+++ b/graph/incidents_graphml/b/b7aaa660-70e5-11ee-adf7-3be9df66b766.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.77
+ 100.64.68.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1697984242
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7aaa660-70e5-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984242
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7aaa660-70e5-11ee-adf7-3be9df66b766
+
+
+
diff --git a/graph/incidents_graphml/b/b7b713e0-1291-11ed-83c9-c740e142a095.graphml b/graph/incidents_graphml/b/b7b713e0-1291-11ed-83c9-c740e142a095.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccf9811c5595492873433735e7b357fad477105c
--- /dev/null
+++ b/graph/incidents_graphml/b/b7b713e0-1291-11ed-83c9-c740e142a095.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.17.250
+ 100.64.17.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659465258
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7b713e0-1291-11ed-83c9-c740e142a095
+
+
+
diff --git a/graph/incidents_graphml/b/b7b83870-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b7b83870-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0252de621720ec817bbdd36207a420662758069f
--- /dev/null
+++ b/graph/incidents_graphml/b/b7b83870-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.68
+ 100.64.37.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909046
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7b83870-54ed-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694909046
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7b83870-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b7bfc110-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/b/b7bfc110-1c9b-11ee-baac-abb351177483.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bc71f1812cdad00a1b3573bf5171c202a0b6b66
--- /dev/null
+++ b/graph/incidents_graphml/b/b7bfc110-1c9b-11ee-baac-abb351177483.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.72
+ 100.64.35.72
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688716562
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7bfc110-1c9b-11ee-baac-abb351177483
+
+
+
diff --git a/graph/incidents_graphml/b/b7c23770-1291-11ed-83c9-c740e142a095.graphml b/graph/incidents_graphml/b/b7c23770-1291-11ed-83c9-c740e142a095.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4199c3f4d24a24241e26bfe512ce26b845b29b2
--- /dev/null
+++ b/graph/incidents_graphml/b/b7c23770-1291-11ed-83c9-c740e142a095.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.129
+ 100.64.92.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659465258
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7c23770-1291-11ed-83c9-c740e142a095
+
+
+
diff --git a/graph/incidents_graphml/b/b7c69c10-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/b/b7c69c10-65c6-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f161fc98a67178dce9c3f2dd27aba7dfb6ebfab3
--- /dev/null
+++ b/graph/incidents_graphml/b/b7c69c10-65c6-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.152
+ 100.64.81.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.40
+ 100.64.73.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1668613967
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7c69c10-65c6-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668613967
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7c69c10-65c6-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/b/b7c851f0-1291-11ed-83c9-c740e142a095.graphml b/graph/incidents_graphml/b/b7c851f0-1291-11ed-83c9-c740e142a095.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46c35a386ed40342e1abeb402d4abaebfb9a4f18
--- /dev/null
+++ b/graph/incidents_graphml/b/b7c851f0-1291-11ed-83c9-c740e142a095.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.129
+ 100.64.92.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659465258
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7c851f0-1291-11ed-83c9-c740e142a095
+
+
+
diff --git a/graph/incidents_graphml/b/b7cd52d0-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/b/b7cd52d0-65c6-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4814fb7bc071545808d9a6799698cad75aade9b2
--- /dev/null
+++ b/graph/incidents_graphml/b/b7cd52d0-65c6-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.153
+ 100.64.81.153
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.200
+ 100.64.72.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1668613967
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7cd52d0-65c6-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668613967
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7cd52d0-65c6-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/b/b7cdbc40-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b7cdbc40-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1916d7029163f253fdb898bff66853e2f7fb34d5
--- /dev/null
+++ b/graph/incidents_graphml/b/b7cdbc40-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.68
+ 100.64.37.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909046
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7cdbc40-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/b/b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cc52bf558f65db67951174b8ede5a184dbabe0c
--- /dev/null
+++ b/graph/incidents_graphml/b/b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.85
+ 100.64.78.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657069095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/b/b7d6a470-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/b/b7d6a470-1c9b-11ee-baac-abb351177483.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3462bde86fd18e9f13945e86ce324a7fa6abc320
--- /dev/null
+++ b/graph/incidents_graphml/b/b7d6a470-1c9b-11ee-baac-abb351177483.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.74
+ 100.64.35.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688716562
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7d6a470-1c9b-11ee-baac-abb351177483
+
+
+
diff --git a/graph/incidents_graphml/b/b7e5c250-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b7e5c250-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ec3b2aa0bcb94275bc5296bce5490cb2440cb7f
--- /dev/null
+++ b/graph/incidents_graphml/b/b7e5c250-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7e5c250-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b7ea9960-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/b/b7ea9960-311a-11ee-87a2-613e036775fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60fbe37fd6912689749a395518f0390554a1b78c
--- /dev/null
+++ b/graph/incidents_graphml/b/b7ea9960-311a-11ee-87a2-613e036775fd.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.50
+ 100.64.58.50
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.51
+ 100.64.58.51
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.52
+ 100.64.58.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690970132
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b7ea9960-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970132
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b7ea9960-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970132
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b7ea9960-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970132
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b7ea9960-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970132
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b7ea9960-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970132
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b7ea9960-311a-11ee-87a2-613e036775fd
+
+
+
diff --git a/graph/incidents_graphml/b/b7eaeec0-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b7eaeec0-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c48ffa1e0b99d7c094a444c2823e2e519b197fcf
--- /dev/null
+++ b/graph/incidents_graphml/b/b7eaeec0-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.120
+ 100.64.25.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.168
+ 100.64.30.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.5
+ USER-0015-1363.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.43
+ 100.64.4.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915980
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7eaeec0-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915980
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7eaeec0-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915980
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7eaeec0-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915980
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7eaeec0-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915980
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7eaeec0-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915980
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7eaeec0-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915980
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7eaeec0-1553-11ee-a373-07433a95fe5c
+
+
+ INCIDENT_LINK
+ 1687915980
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b7eaeec0-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b7ed87f0-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b7ed87f0-3fb2-11ee-b2f5-ad594961d736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bdcfc0141509ba9bde1221de7897a5807e49336
--- /dev/null
+++ b/graph/incidents_graphml/b/b7ed87f0-3fb2-11ee-b2f5-ad594961d736.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692574731
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7ed87f0-3fb2-11ee-b2f5-ad594961d736
+
+
+
diff --git a/graph/incidents_graphml/b/b7f06450-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b7f06450-892a-11ed-9e45-31aae3dc518d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0eca32e79a6aa69837f87b51331aac538d794e70
--- /dev/null
+++ b/graph/incidents_graphml/b/b7f06450-892a-11ed-9e45-31aae3dc518d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.79
+ 100.64.91.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672505208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7f06450-892a-11ed-9e45-31aae3dc518d
+
+
+
diff --git a/graph/incidents_graphml/b/b7f465a0-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/b/b7f465a0-1c9b-11ee-baac-abb351177483.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62e7417dc27abcc85518b23e39940a12a5b4e397
--- /dev/null
+++ b/graph/incidents_graphml/b/b7f465a0-1c9b-11ee-baac-abb351177483.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.74
+ 100.64.35.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688716562
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7f465a0-1c9b-11ee-baac-abb351177483
+
+
+
diff --git a/graph/incidents_graphml/b/b7f67ed0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b7f67ed0-892a-11ed-9e45-31aae3dc518d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c6aaf1a11a2426e96140ec58505f9160b8aa199
--- /dev/null
+++ b/graph/incidents_graphml/b/b7f67ed0-892a-11ed-9e45-31aae3dc518d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.79
+ 100.64.91.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672505208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7f67ed0-892a-11ed-9e45-31aae3dc518d
+
+
+
diff --git a/graph/incidents_graphml/b/b7f8efd0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b7f8efd0-892a-11ed-9e45-31aae3dc518d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21fb89df29bff49e59519aa7012a76f515a06f67
--- /dev/null
+++ b/graph/incidents_graphml/b/b7f8efd0-892a-11ed-9e45-31aae3dc518d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.80
+ 100.64.91.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672505208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b7f8efd0-892a-11ed-9e45-31aae3dc518d
+
+
+
diff --git a/graph/incidents_graphml/b/b7fb6cf0-2fec-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/b/b7fb6cf0-2fec-11ef-bbc8-b57a691da072.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0007a9e1bf4a5271a38b36216984d79821e9bba0
--- /dev/null
+++ b/graph/incidents_graphml/b/b7fb6cf0-2fec-11ef-bbc8-b57a691da072.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.238.61
+ 172.30.238.61
+ ["Exploiting Target","Exploiting Host"]
+ 0.859375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.124
+ 100.64.3.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.859375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718987921
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7fb6cf0-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987921
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7fb6cf0-2fec-11ef-bbc8-b57a691da072
+
+
+
diff --git a/graph/incidents_graphml/b/b7fd83b0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b7fd83b0-892a-11ed-9e45-31aae3dc518d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d58d7eddab38fdb7ecaa1e190b00cbc6331a97c9
--- /dev/null
+++ b/graph/incidents_graphml/b/b7fd83b0-892a-11ed-9e45-31aae3dc518d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.80
+ 100.64.91.80
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1672505208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7fd83b0-892a-11ed-9e45-31aae3dc518d
+
+
+
diff --git a/graph/incidents_graphml/b/b7fdaac0-cff7-11ed-b87d-e343a0a76f13.graphml b/graph/incidents_graphml/b/b7fdaac0-cff7-11ed-b87d-e343a0a76f13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d452597a88a8fc18614c4f633e0becaf7536d490
--- /dev/null
+++ b/graph/incidents_graphml/b/b7fdaac0-cff7-11ed-b87d-e343a0a76f13.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.1
+ 100.64.69.1
+ ["Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.255
+ 100.64.68.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1680289836
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7fdaac0-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289836
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7fdaac0-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289836
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7fdaac0-cff7-11ed-b87d-e343a0a76f13
+
+
+
diff --git a/graph/incidents_graphml/b/b7fe7a70-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b7fe7a70-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b99bd45d9679e8a9231555718b34af5e8869e6b3
--- /dev/null
+++ b/graph/incidents_graphml/b/b7fe7a70-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028876
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b7fe7a70-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b7fe9ef0-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b7fe9ef0-3fb2-11ee-b2f5-ad594961d736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2abf18c8bf2116b066ba8f59c5d5cb387b5585b
--- /dev/null
+++ b/graph/incidents_graphml/b/b7fe9ef0-3fb2-11ee-b2f5-ad594961d736.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692574731
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b7fe9ef0-3fb2-11ee-b2f5-ad594961d736
+
+
+
diff --git a/graph/incidents_graphml/b/b800b800-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b800b800-892a-11ed-9e45-31aae3dc518d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2560d6f0b91f0aab9fcb26a25ee4ec3fecf5f56f
--- /dev/null
+++ b/graph/incidents_graphml/b/b800b800-892a-11ed-9e45-31aae3dc518d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.47
+ 100.64.11.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672505208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b800b800-892a-11ed-9e45-31aae3dc518d
+
+
+
diff --git a/graph/incidents_graphml/b/b808bd80-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b808bd80-56c5-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..539e71f9f55fa3f3694f199176fa012e39d5b9f3
--- /dev/null
+++ b/graph/incidents_graphml/b/b808bd80-56c5-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.193
+ 100.64.75.193
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.3
+ 100.64.72.3
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666964271
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b808bd80-56c5-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/b/b8091c70-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b8091c70-892a-11ed-9e45-31aae3dc518d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed94be3747089bc3244cc060fe13e863a358219c
--- /dev/null
+++ b/graph/incidents_graphml/b/b8091c70-892a-11ed-9e45-31aae3dc518d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.11.47
+ 100.64.11.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672505208
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8091c70-892a-11ed-9e45-31aae3dc518d
+
+
+
diff --git a/graph/incidents_graphml/b/b80a7c00-cff7-11ed-b87d-e343a0a76f13.graphml b/graph/incidents_graphml/b/b80a7c00-cff7-11ed-b87d-e343a0a76f13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1eaf2252eac55f044b817a38aad5031c6a6e5e77
--- /dev/null
+++ b/graph/incidents_graphml/b/b80a7c00-cff7-11ed-b87d-e343a0a76f13.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1680289836
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b80a7c00-cff7-11ed-b87d-e343a0a76f13
+
+
+
diff --git a/graph/incidents_graphml/b/b80f67d0-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b80f67d0-3fb2-11ee-b2f5-ad594961d736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ae916f10f5e434d47d64002441d8dd8029fd3b7
--- /dev/null
+++ b/graph/incidents_graphml/b/b80f67d0-3fb2-11ee-b2f5-ad594961d736.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.167
+ 100.64.18.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692574732
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b80f67d0-3fb2-11ee-b2f5-ad594961d736
+
+
+
diff --git a/graph/incidents_graphml/b/b80fe220-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b80fe220-6503-11ee-b447-a9f06618d419.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8d3f4cdead05fcd5392c02b8362860e0fc2bde7
--- /dev/null
+++ b/graph/incidents_graphml/b/b80fe220-6503-11ee-b447-a9f06618d419.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.254
+ 100.64.89.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696677714
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b80fe220-6503-11ee-b447-a9f06618d419
+
+
+
diff --git a/graph/incidents_graphml/b/b8101080-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b8101080-56c5-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a395c41245f8c17d4dcac69a253cf18d6442c69
--- /dev/null
+++ b/graph/incidents_graphml/b/b8101080-56c5-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.194
+ 100.64.75.194
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666964271
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8101080-56c5-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/b/b8131830-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/b8131830-3c0b-11ee-8ad1-f5005abd06b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f3dd7aa79bcbeada3e38468153ecb75e7af9741
--- /dev/null
+++ b/graph/incidents_graphml/b/b8131830-3c0b-11ee-8ad1-f5005abd06b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.54
+ 100.64.85.54
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692173152
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8131830-3c0b-11ee-8ad1-f5005abd06b8
+
+
+
diff --git a/graph/incidents_graphml/b/b8207ed0-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b8207ed0-3fb2-11ee-b2f5-ad594961d736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e911c7d706808a4eca29937aa99928877693cfe6
--- /dev/null
+++ b/graph/incidents_graphml/b/b8207ed0-3fb2-11ee-b2f5-ad594961d736.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.167
+ 100.64.18.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692574732
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8207ed0-3fb2-11ee-b2f5-ad594961d736
+
+
+
diff --git a/graph/incidents_graphml/b/b820f920-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b820f920-6503-11ee-b447-a9f06618d419.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c54e4c7c4c828ad46ee82993044cba7765db990
--- /dev/null
+++ b/graph/incidents_graphml/b/b820f920-6503-11ee-b447-a9f06618d419.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.254
+ 100.64.89.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696677714
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b820f920-6503-11ee-b447-a9f06618d419
+
+
+
diff --git a/graph/incidents_graphml/b/b8260dd0-1133-11ee-a919-7371bcc8a8e4.graphml b/graph/incidents_graphml/b/b8260dd0-1133-11ee-a919-7371bcc8a8e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca5fd7fd1963dd1fbec8fbcceea57846de07047c
--- /dev/null
+++ b/graph/incidents_graphml/b/b8260dd0-1133-11ee-a919-7371bcc8a8e4.graphml
@@ -0,0 +1,553 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.48
+ 100.64.55.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.49
+ USER-0015-1409.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.50
+ 100.64.55.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.51
+ 100.64.55.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.52
+ 100.64.55.52
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.13
+ 100.64.36.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.53
+ USER-0015-1410.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.54
+ 100.64.55.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.55
+ 100.64.55.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.127
+ 100.64.18.127
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.56
+ 100.64.55.56
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.57
+ 100.64.55.57
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8260dd0-1133-11ee-a919-7371bcc8a8e4
+
+
+
diff --git a/graph/incidents_graphml/b/b82693e0-df14-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/b/b82693e0-df14-11ee-9778-4184b1db151c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7710dad5a6bd43548a0fb6c16a248130fb7fd1f7
--- /dev/null
+++ b/graph/incidents_graphml/b/b82693e0-df14-11ee-9778-4184b1db151c.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.253
+ 100.64.9.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.195
+ 100.64.4.195
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.254
+ 100.64.9.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.255
+ 100.64.9.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.1
+ 100.64.10.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.1
+ 100.64.10.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.2
+ 100.64.10.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.3
+ 100.64.10.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.4
+ 100.64.10.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.5
+ 100.64.10.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.6
+ 100.64.10.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.7
+ 100.64.10.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.8
+ 100.64.10.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.9
+ 100.64.10.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.10
+ 100.64.10.10
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.11
+ 100.64.10.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.12
+ 100.64.10.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099057
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b82693e0-df14-11ee-9778-4184b1db151c
+
+
+
diff --git a/graph/incidents_graphml/b/b82a1690-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/b/b82a1690-a113-11ed-b936-1349c6e38dc6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..395e8e5e92b111178990c7329dcb345c17859a19
--- /dev/null
+++ b/graph/incidents_graphml/b/b82a1690-a113-11ed-b936-1349c6e38dc6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.134
+ 100.64.86.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675134158
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b82a1690-a113-11ed-b936-1349c6e38dc6
+
+
+
diff --git a/graph/incidents_graphml/b/b82e8360-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/b/b82e8360-a113-11ed-b936-1349c6e38dc6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0206e2ef353900e6b80f65d4e62fdd392b8cc25e
--- /dev/null
+++ b/graph/incidents_graphml/b/b82e8360-a113-11ed-b936-1349c6e38dc6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.134
+ 100.64.86.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675134158
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b82e8360-a113-11ed-b936-1349c6e38dc6
+
+
+
diff --git a/graph/incidents_graphml/b/b8302790-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b8302790-54ed-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..534affd1525979fe580a42c5285438d8ad7a0e02
--- /dev/null
+++ b/graph/incidents_graphml/b/b8302790-54ed-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.125
+ 100.64.11.125
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694909047
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8302790-54ed-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/b/b838d280-1133-11ee-a919-7371bcc8a8e4.graphml b/graph/incidents_graphml/b/b838d280-1133-11ee-a919-7371bcc8a8e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..350a404ea44a380edd6e1f41de9327dad2cb9f77
--- /dev/null
+++ b/graph/incidents_graphml/b/b838d280-1133-11ee-a919-7371bcc8a8e4.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.67
+ 100.64.55.67
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ HOST-2906
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b838d280-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b838d280-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b838d280-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462432
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b838d280-1133-11ee-a919-7371bcc8a8e4
+
+
+
diff --git a/graph/incidents_graphml/b/b8390ab0-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/b/b8390ab0-a113-11ed-b936-1349c6e38dc6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d02d51a4ccc4fd3981bf1e26622fe039d3af7322
--- /dev/null
+++ b/graph/incidents_graphml/b/b8390ab0-a113-11ed-b936-1349c6e38dc6.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.136
+ 100.64.86.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675134158
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b8390ab0-a113-11ed-b936-1349c6e38dc6
+
+
+ INCIDENT_LINK
+ 1675134158
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b8390ab0-a113-11ed-b936-1349c6e38dc6
+
+
+
diff --git a/graph/incidents_graphml/b/b83cdb40-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/b/b83cdb40-a113-11ed-b936-1349c6e38dc6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eaee0a12f1c23e00ff32d0f540b18af4cdb78be9
--- /dev/null
+++ b/graph/incidents_graphml/b/b83cdb40-a113-11ed-b936-1349c6e38dc6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.136
+ 100.64.86.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675134158
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b83cdb40-a113-11ed-b936-1349c6e38dc6
+
+
+
diff --git a/graph/incidents_graphml/b/b849db10-2fec-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/b/b849db10-2fec-11ef-bbc8-b57a691da072.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..016a1bfd437ff5106959262699f504693cf40846
--- /dev/null
+++ b/graph/incidents_graphml/b/b849db10-2fec-11ef-bbc8-b57a691da072.graphml
@@ -0,0 +1,689 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ USER-0015-1979.example.internal
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.245
+ USER-0015-2083.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.46.208
+ USER-0015-1982.example.internal
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.27
+ USER-0015-2084.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.28
+ USER-0015-2085.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.29
+ 100.64.92.29
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.30
+ USER-0015-2086.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.130
+ USER-0015-2087.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.31
+ 100.64.92.31
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.32
+ HOST-18244
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.231
+ USER-0015-2075.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.33
+ USER-0015-2088.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b849db10-2fec-11ef-bbc8-b57a691da072
+
+
+
diff --git a/graph/incidents_graphml/b/b84f5de0-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/b84f5de0-3c0b-11ee-8ad1-f5005abd06b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e76c5fcfadaf8bd12092e9b3c3bf8861b07e9ec
--- /dev/null
+++ b/graph/incidents_graphml/b/b84f5de0-3c0b-11ee-8ad1-f5005abd06b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.63
+ 100.64.85.63
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692173153
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b84f5de0-3c0b-11ee-8ad1-f5005abd06b8
+
+
+
diff --git a/graph/incidents_graphml/b/b854ad10-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b854ad10-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c6d8c91e5d1af58652791e0fdd124627f6dc65f
--- /dev/null
+++ b/graph/incidents_graphml/b/b854ad10-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.243
+ USER-0015-1364.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b854ad10-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b8693130-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b8693130-634c-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b6f3372e577299416d4fbc82854ad91e3773870
--- /dev/null
+++ b/graph/incidents_graphml/b/b8693130-634c-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.54
+ 100.64.9.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696489165
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8693130-634c-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/b/b86994a0-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b86994a0-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..080b48ccf232bd6f491b9d334d3e9443dbed2c7f
--- /dev/null
+++ b/graph/incidents_graphml/b/b86994a0-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.243
+ USER-0015-1364.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b86994a0-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b86e06e0-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/b86e06e0-95ae-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cf4bc35e556bf8f7e56c394868746a346a26947
--- /dev/null
+++ b/graph/incidents_graphml/b/b86e06e0-95ae-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.235
+ 100.64.75.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.226
+ 100.64.1.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1673881316
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b86e06e0-95ae-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673881316
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b86e06e0-95ae-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/b/b86fb490-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/b86fb490-95ae-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3b5773340381b369c9a74e4bf688cc3ef10317c
--- /dev/null
+++ b/graph/incidents_graphml/b/b86fb490-95ae-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.236
+ 100.64.75.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.90
+ 100.64.71.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1673881316
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b86fb490-95ae-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673881316
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b86fb490-95ae-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/b/b87a60f0-2fec-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/b/b87a60f0-2fec-11ef-bbc8-b57a691da072.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1f19be27dedee6ca11ddcc5eecbab32ccbf78c9
--- /dev/null
+++ b/graph/incidents_graphml/b/b87a60f0-2fec-11ef-bbc8-b57a691da072.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.124.214
+ USER-0015-2089.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.63
+ USER-0015-2090.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b87a60f0-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b87a60f0-2fec-11ef-bbc8-b57a691da072
+
+
+
diff --git a/graph/incidents_graphml/b/b88185d0-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/b88185d0-ebef-11ec-9679-75d3d6184114.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b92787e7ac28b923c4fb745eb76ee93a41a82e26
--- /dev/null
+++ b/graph/incidents_graphml/b/b88185d0-ebef-11ec-9679-75d3d6184114.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.255
+ 100.64.79.255
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.181
+ 100.64.71.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.77
+ 100.64.73.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.1
+ 100.64.80.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655217536
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b88185d0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217536
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b88185d0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217536
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b88185d0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217536
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b88185d0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217536
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b88185d0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217536
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b88185d0-ebef-11ec-9679-75d3d6184114
+
+
+
diff --git a/graph/incidents_graphml/b/b883d360-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b883d360-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09ec0960b9d0a9a568a6777d1744fc3d037301b2
--- /dev/null
+++ b/graph/incidents_graphml/b/b883d360-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.245
+ 100.64.46.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915981
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b883d360-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b8857840-3f5c-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/b/b8857840-3f5c-11ee-a7a8-a9c952ce7042.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81f7990d453142ccf67ba7f110dc13f7485691c3
--- /dev/null
+++ b/graph/incidents_graphml/b/b8857840-3f5c-11ee-a7a8-a9c952ce7042.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.22
+ 100.64.36.22
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.245
+ 100.64.69.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.8515
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.246
+ 100.64.69.246
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537796
+ malicious
+ 0.8515
+ 0.8515
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8857840-3f5c-11ee-a7a8-a9c952ce7042
+
+
+
diff --git a/graph/incidents_graphml/b/b88a41b0-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b88a41b0-75ab-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57377d0f6cf55a3323742ce51eea6d156eb2a39c
--- /dev/null
+++ b/graph/incidents_graphml/b/b88a41b0-75ab-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.15
+ 100.64.33.15
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698509089
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b88a41b0-75ab-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/b/b8964d60-2fec-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/b/b8964d60-2fec-11ef-bbc8-b57a691da072.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7726b00718dafbec4909511e9884eba20d977c6
--- /dev/null
+++ b/graph/incidents_graphml/b/b8964d60-2fec-11ef-bbc8-b57a691da072.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.90.197
+ USER-0015-2091.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.64
+ USER-0015-2092.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b8964d60-2fec-11ef-bbc8-b57a691da072
+
+
+ INCIDENT_LINK
+ 1718987922
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b8964d60-2fec-11ef-bbc8-b57a691da072
+
+
+
diff --git a/graph/incidents_graphml/b/b89b3510-0bbc-11ed-b340-87a279bd0bd3.graphml b/graph/incidents_graphml/b/b89b3510-0bbc-11ed-b340-87a279bd0bd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d9f5fb31bdc7e3e3208c0a831a2941f26c50407
--- /dev/null
+++ b/graph/incidents_graphml/b/b89b3510-0bbc-11ed-b340-87a279bd0bd3.graphml
@@ -0,0 +1,129 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.248
+ 100.64.84.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1658714069
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b89b3510-0bbc-11ed-b340-87a279bd0bd3
+
+
+ INCIDENT_LINK
+ 1658714069
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b89b3510-0bbc-11ed-b340-87a279bd0bd3
+
+
+ INCIDENT_LINK
+ 1658714069
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b89b3510-0bbc-11ed-b340-87a279bd0bd3
+
+
+ INCIDENT_LINK
+ 1658714069
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b89b3510-0bbc-11ed-b340-87a279bd0bd3
+
+
+
diff --git a/graph/incidents_graphml/b/b89d0660-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b89d0660-75ab-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13bf9632ec621b37449d538cefe776b9aa12e3d1
--- /dev/null
+++ b/graph/incidents_graphml/b/b89d0660-75ab-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.17
+ 100.64.33.17
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698509089
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b89d0660-75ab-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/b/b8a4a1d0-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b8a4a1d0-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3dc669b2c2db3b924ac6d5c55c2d1dd3807fd3ed
--- /dev/null
+++ b/graph/incidents_graphml/b/b8a4a1d0-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.245
+ 100.64.46.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915982
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8a4a1d0-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b8ac2190-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b8ac2190-75ab-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b808eb31e17e691f4b1bea707af389d9c6f5b6dd
--- /dev/null
+++ b/graph/incidents_graphml/b/b8ac2190-75ab-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.17
+ 100.64.33.17
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698509089
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8ac2190-75ab-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/b/b8ad9420-15a3-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/b/b8ad9420-15a3-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..776edd3869fc709a5388c8a8086a0bf3a9be1175
--- /dev/null
+++ b/graph/incidents_graphml/b/b8ad9420-15a3-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.237
+ 100.64.73.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.85
+ 100.64.73.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.45.252
+ 100.64.45.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687950341
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8ad9420-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950341
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8ad9420-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950341
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8ad9420-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950341
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8ad9420-15a3-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/b/b8b8a4f0-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b8b8a4f0-a5e0-11ee-af6c-2f69bce079e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..839345044de7d7d8ed7f62227579db029d991a5f
--- /dev/null
+++ b/graph/incidents_graphml/b/b8b8a4f0-a5e0-11ee-af6c-2f69bce079e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.66
+ 100.64.36.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703809508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b8b8a4f0-a5e0-11ee-af6c-2f69bce079e5
+
+
+
diff --git a/graph/incidents_graphml/b/b8bbb1f0-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b8bbb1f0-75ab-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a857651d0e8f65f1241e86505cb872873860ea14
--- /dev/null
+++ b/graph/incidents_graphml/b/b8bbb1f0-75ab-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.19
+ 100.64.33.19
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698509089
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8bbb1f0-75ab-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/b/b8c06c50-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/b8c06c50-f6a1-11ee-8b23-bde5dce38992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a2286da5bb34518bace585456695e800450fed9
--- /dev/null
+++ b/graph/incidents_graphml/b/b8c06c50-f6a1-11ee-8b23-bde5dce38992.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.14
+ 100.64.22.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712688494
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8c06c50-f6a1-11ee-8b23-bde5dce38992
+
+
+
diff --git a/graph/incidents_graphml/b/b8c92710-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/b/b8c92710-a0fb-11ee-b868-0b39d8f52622.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57baabfb9c1bde710922077bf7fc75ab3f44cb98
--- /dev/null
+++ b/graph/incidents_graphml/b/b8c92710-a0fb-11ee-b868-0b39d8f52622.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.163
+ 100.64.14.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703271349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b8c92710-a0fb-11ee-b868-0b39d8f52622
+
+
+
diff --git a/graph/incidents_graphml/b/b8ccf000-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b8ccf000-75ab-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..898249f6443356f0c35826556aa118685917cc54
--- /dev/null
+++ b/graph/incidents_graphml/b/b8ccf000-75ab-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.113
+ 100.64.22.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698509089
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8ccf000-75ab-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/b/b8d1a8f0-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b8d1a8f0-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7724fff496e8ab33bdc67c4d7ba5e466b373662
--- /dev/null
+++ b/graph/incidents_graphml/b/b8d1a8f0-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.42
+ 100.64.37.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b8d1a8f0-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b8d357b0-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/b/b8d357b0-182c-11ee-b591-f5bec484f8bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2eb004574672ded852ce154608d425beb885cf86
--- /dev/null
+++ b/graph/incidents_graphml/b/b8d357b0-182c-11ee-b591-f5bec484f8bc.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.74
+ 100.64.73.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688229085
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8d357b0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229085
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8d357b0-182c-11ee-b591-f5bec484f8bc
+
+
+
diff --git a/graph/incidents_graphml/b/b8d4a240-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/b8d4a240-11c0-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9abbe7293093092956d4723e6f282a947cb186b8
--- /dev/null
+++ b/graph/incidents_graphml/b/b8d4a240-11c0-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.6
+ 100.64.23.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.2
+ 100.64.71.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.227
+ 100.64.72.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687522992
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8d4a240-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522992
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8d4a240-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522992
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8d4a240-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522992
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b8d4a240-11c0-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/b/b8db7690-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/b/b8db7690-a0fb-11ee-b868-0b39d8f52622.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c3ea8bac840eaba103629af34f05dc6049544e4
--- /dev/null
+++ b/graph/incidents_graphml/b/b8db7690-a0fb-11ee-b868-0b39d8f52622.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.163
+ 100.64.14.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703271349
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b8db7690-a0fb-11ee-b868-0b39d8f52622
+
+
+
diff --git a/graph/incidents_graphml/b/b909ef70-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b909ef70-de41-11ed-8036-d144f5e7f2f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f193fcc35f000f2649ef61b03228d65106e55f1
--- /dev/null
+++ b/graph/incidents_graphml/b/b909ef70-de41-11ed-8036-d144f5e7f2f2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.114
+ 100.64.78.114
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.158
+ HOST-13815
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681860937
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b909ef70-de41-11ed-8036-d144f5e7f2f2
+
+
+ INCIDENT_LINK
+ 1681860937
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b909ef70-de41-11ed-8036-d144f5e7f2f2
+
+
+
diff --git a/graph/incidents_graphml/b/b914a430-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b914a430-f924-11ed-a4ab-835920bf1a34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed38f66f5325627b0f0303721fce22e95c75eba1
--- /dev/null
+++ b/graph/incidents_graphml/b/b914a430-f924-11ed-a4ab-835920bf1a34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.19.8
+ 100.64.19.8
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684817163
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b914a430-f924-11ed-a4ab-835920bf1a34
+
+
+
diff --git a/graph/incidents_graphml/b/b91a2f10-a813-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/b/b91a2f10-a813-11ee-99fc-3f84722b2bdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd2c4486cd6e942cb0c77691068bc007d542d1cb
--- /dev/null
+++ b/graph/incidents_graphml/b/b91a2f10-a813-11ee-99fc-3f84722b2bdf.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.249.158.95
+ 10.249.158.95
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","PAN NGFW","Cisco Network Operating System","Windows Active Directory"]
+
+
+ HOST
+ 100.64.68.254
+ 100.64.68.254
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1704051315
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b91a2f10-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051315
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b91a2f10-a813-11ee-99fc-3f84722b2bdf
+
+
+
diff --git a/graph/incidents_graphml/b/b9258920-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/b9258920-258f-11ee-aa0d-9950110e3974.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9abfaec09f279c40b4d82cd97761734e70a21d02
--- /dev/null
+++ b/graph/incidents_graphml/b/b9258920-258f-11ee-aa0d-9950110e3974.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.37
+ 100.64.25.37
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689700971
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9258920-258f-11ee-aa0d-9950110e3974
+
+
+
diff --git a/graph/incidents_graphml/b/b92f0c20-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b92f0c20-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36e8dd84c56c08257263131d18ac96f3e1c6d1f2
--- /dev/null
+++ b/graph/incidents_graphml/b/b92f0c20-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.177
+ USER-0015-1823.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659674854
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b92f0c20-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b931f250-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b931f250-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..955cd0fe3458aba39defd5dafc5a5fd5382da4d3
--- /dev/null
+++ b/graph/incidents_graphml/b/b931f250-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.15
+ 100.64.76.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659674854
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b931f250-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b9372270-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b9372270-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3ceb94688ee2574fd8bea23fdbd68380712bc89
--- /dev/null
+++ b/graph/incidents_graphml/b/b9372270-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.15
+ 100.64.76.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659674854
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b9372270-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b9396c60-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b9396c60-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96d83ae7af748c5bcbec5ca780f5f67e9baaa90e
--- /dev/null
+++ b/graph/incidents_graphml/b/b9396c60-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.188
+ 100.64.5.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.249
+ 100.64.73.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.204
+ 100.64.76.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659674854
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b9396c60-1479-11ed-8143-57b2da877ba3
+
+
+ INCIDENT_LINK
+ 1659674854
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b9396c60-1479-11ed-8143-57b2da877ba3
+
+
+ INCIDENT_LINK
+ 1659674854
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b9396c60-1479-11ed-8143-57b2da877ba3
+
+
+ INCIDENT_LINK
+ 1659674854
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b9396c60-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b93d15e0-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b93d15e0-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c681b5532d401b9e8c9663df807ffb04de76e7a6
--- /dev/null
+++ b/graph/incidents_graphml/b/b93d15e0-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.33
+ 100.64.72.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659674854
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b93d15e0-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b93de650-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b93de650-634c-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea0b51d633e0f901c25c0c8a2b80ae8eb5ae3ad4
--- /dev/null
+++ b/graph/incidents_graphml/b/b93de650-634c-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.56
+ 100.64.9.56
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696489167
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b93de650-634c-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/b/b943cca0-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b943cca0-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d29c782820d67a75a7f16d2db786a192365d8c5f
--- /dev/null
+++ b/graph/incidents_graphml/b/b943cca0-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.33
+ 100.64.72.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659674855
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b943cca0-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b9456740-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/b/b9456740-9773-11ed-8e25-218966643970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6aeb183af0bf05657333005059ab31fa7204a099
--- /dev/null
+++ b/graph/incidents_graphml/b/b9456740-9773-11ed-8e25-218966643970.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.25
+ 100.64.1.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1674075880
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9456740-9773-11ed-8e25-218966643970
+
+
+ INCIDENT_LINK
+ 1674075880
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9456740-9773-11ed-8e25-218966643970
+
+
+
diff --git a/graph/incidents_graphml/b/b94aaa70-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b94aaa70-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7836c226c021f224d186d82b1b68b19b7208704
--- /dev/null
+++ b/graph/incidents_graphml/b/b94aaa70-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.230
+ 100.64.74.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659674855
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b94aaa70-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b94d22f0-30ec-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/b/b94d22f0-30ec-11ef-bae8-75e6361c756f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50443d72dfebc16f20574d498a7cf896041702b8
--- /dev/null
+++ b/graph/incidents_graphml/b/b94d22f0-30ec-11ef-bae8-75e6361c756f.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.179
+ 100.64.16.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.252
+ 100.64.26.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719097875
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b94d22f0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097875
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b94d22f0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097875
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b94d22f0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097875
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b94d22f0-30ec-11ef-bae8-75e6361c756f
+
+
+
diff --git a/graph/incidents_graphml/b/b950ec80-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/b950ec80-f6a1-11ee-8b23-bde5dce38992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..619a0534b7b378e83029d485717f0231306cd507
--- /dev/null
+++ b/graph/incidents_graphml/b/b950ec80-f6a1-11ee-8b23-bde5dce38992.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.72
+ 100.64.15.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712688495
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b950ec80-f6a1-11ee-8b23-bde5dce38992
+
+
+
diff --git a/graph/incidents_graphml/b/b9513a20-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b9513a20-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb9744ee84ab857c90d68cc1fb49dc4386b84d1b
--- /dev/null
+++ b/graph/incidents_graphml/b/b9513a20-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.230
+ 100.64.74.230
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659674855
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9513a20-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b95231a0-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b95231a0-634c-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59aea7bfdd7ea24c1810de10788085ff0330381f
--- /dev/null
+++ b/graph/incidents_graphml/b/b95231a0-634c-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.56
+ 100.64.9.56
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696489167
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b95231a0-634c-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/b/b9530190-cff7-11ed-b87d-e343a0a76f13.graphml b/graph/incidents_graphml/b/b9530190-cff7-11ed-b87d-e343a0a76f13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5dcd2361ae56e86396096a4d38118d9e07fad4de
--- /dev/null
+++ b/graph/incidents_graphml/b/b9530190-cff7-11ed-b87d-e343a0a76f13.graphml
@@ -0,0 +1,323 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.1
+ 100.64.69.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.118
+ 100.64.68.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.905078125
+ ["Precinct","Okta","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.2
+ 100.64.69.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.3
+ 100.64.69.3
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.65.56
+ 100.64.65.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.143
+ 100.64.68.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.4
+ 100.64.69.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.5
+ 100.64.69.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+ INCIDENT_LINK
+ 1680289839
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9530190-cff7-11ed-b87d-e343a0a76f13
+
+
+
diff --git a/graph/incidents_graphml/b/b9549580-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b9549580-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd386af99eec273510e6b9f5a504fbf9c139e6ee
--- /dev/null
+++ b/graph/incidents_graphml/b/b9549580-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.165
+ 100.64.77.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659674855
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9549580-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b95a3ad0-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b95a3ad0-1479-11ed-8143-57b2da877ba3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3642fe6f6d662f32221c26d30e07028cf1b797c
--- /dev/null
+++ b/graph/incidents_graphml/b/b95a3ad0-1479-11ed-8143-57b2da877ba3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.165
+ 100.64.77.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659674855
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b95a3ad0-1479-11ed-8143-57b2da877ba3
+
+
+
diff --git a/graph/incidents_graphml/b/b963d5a0-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b963d5a0-f924-11ed-a4ab-835920bf1a34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f52c666f1d42315e7add28a5930dcd422acfee18
--- /dev/null
+++ b/graph/incidents_graphml/b/b963d5a0-f924-11ed-a4ab-835920bf1a34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.10
+ 100.64.19.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684817164
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b963d5a0-f924-11ed-a4ab-835920bf1a34
+
+
+
diff --git a/graph/incidents_graphml/b/b9648120-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b9648120-634c-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1d35d4447f61202e20b3427272e7e693d481882
--- /dev/null
+++ b/graph/incidents_graphml/b/b9648120-634c-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.58
+ 100.64.9.58
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696489167
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b9648120-634c-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/b/b9670c90-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/b9670c90-f6a1-11ee-8b23-bde5dce38992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca856b666c5b349897a7c4880e4237afab7d80fc
--- /dev/null
+++ b/graph/incidents_graphml/b/b9670c90-f6a1-11ee-8b23-bde5dce38992.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.72
+ 100.64.15.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712688495
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9670c90-f6a1-11ee-8b23-bde5dce38992
+
+
+
diff --git a/graph/incidents_graphml/b/b9723cc0-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b9723cc0-634c-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b454b69b3792c3e8f2b3fc072b0031cff8feda0
--- /dev/null
+++ b/graph/incidents_graphml/b/b9723cc0-634c-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.58
+ 100.64.9.58
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696489167
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9723cc0-634c-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/b/b979cea0-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b979cea0-f924-11ed-a4ab-835920bf1a34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4edd11a90278dec047c2254072100ef23d63a7c0
--- /dev/null
+++ b/graph/incidents_graphml/b/b979cea0-f924-11ed-a4ab-835920bf1a34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.19.10
+ 100.64.19.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684817164
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b979cea0-f924-11ed-a4ab-835920bf1a34
+
+
+
diff --git a/graph/incidents_graphml/b/b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4ba52251e4a6f1b6529cba5c67bf43348db8aa2
--- /dev/null
+++ b/graph/incidents_graphml/b/b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.113
+ 100.64.72.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.4
+ 100.64.72.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.31.165
+ 100.64.31.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690711148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+
diff --git a/graph/incidents_graphml/b/b9965880-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b9965880-5604-11ee-9e22-15516bb414d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2bfcd5d6f074b47057847ea5822dd9f5ac1328f0
--- /dev/null
+++ b/graph/incidents_graphml/b/b9965880-5604-11ee-9e22-15516bb414d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.159
+ 100.64.14.159
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695028878
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b9965880-5604-11ee-9e22-15516bb414d1
+
+
+
diff --git a/graph/incidents_graphml/b/b998b640-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/b/b998b640-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23f077246be7a7cdbd8770ccfbe59439b57309ba
--- /dev/null
+++ b/graph/incidents_graphml/b/b998b640-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.86
+ 100.64.78.86
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.245
+ 100.64.70.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.87
+ 100.64.78.87
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657069098
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b998b640-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069098
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b998b640-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069098
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b998b640-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069098
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b998b640-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/b/b99e09e0-3551-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/b/b99e09e0-3551-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9ad83143c66edcb7e916efc86bddec279dc3429
--- /dev/null
+++ b/graph/incidents_graphml/b/b99e09e0-3551-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.17.24.119
+ 172.17.24.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.140
+ 100.64.95.140
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.100
+ 100.64.95.100
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719581059
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b99e09e0-3551-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581059
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b99e09e0-3551-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581059
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b99e09e0-3551-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581059
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b99e09e0-3551-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/b/b9a683f0-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b9a683f0-f924-11ed-a4ab-835920bf1a34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12772e03460abdfc6bec6e26ca1742d3b44166df
--- /dev/null
+++ b/graph/incidents_graphml/b/b9a683f0-f924-11ed-a4ab-835920bf1a34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.12
+ 100.64.19.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684817164
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9a683f0-f924-11ed-a4ab-835920bf1a34
+
+
+
diff --git a/graph/incidents_graphml/b/b9b7c200-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b9b7c200-f924-11ed-a4ab-835920bf1a34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80dd8827518ee7d439f165e1ab227a570d0d5865
--- /dev/null
+++ b/graph/incidents_graphml/b/b9b7c200-f924-11ed-a4ab-835920bf1a34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.19.12
+ 100.64.19.12
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684817164
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9b7c200-f924-11ed-a4ab-835920bf1a34
+
+
+
diff --git a/graph/incidents_graphml/b/b9c12cb0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b9c12cb0-892a-11ed-9e45-31aae3dc518d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9e75e85eac846470ef11598e02d14e1dbcbec9d
--- /dev/null
+++ b/graph/incidents_graphml/b/b9c12cb0-892a-11ed-9e45-31aae3dc518d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.83
+ 100.64.91.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672505211
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ b9c12cb0-892a-11ed-9e45-31aae3dc518d
+
+
+
diff --git a/graph/incidents_graphml/b/b9c25420-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/b/b9c25420-a0fb-11ee-b868-0b39d8f52622.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25c5725e303d896d0114a41e832ad91a10f77269
--- /dev/null
+++ b/graph/incidents_graphml/b/b9c25420-a0fb-11ee-b868-0b39d8f52622.graphml
@@ -0,0 +1,683 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.165
+ 100.64.14.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.166
+ 100.64.14.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.167
+ 100.64.14.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.211
+ 100.64.10.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.168
+ 100.64.14.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Azure Security"]
+
+
+ HOST
+ 100.64.3.128
+ 100.64.3.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.59
+ 100.64.12.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.169
+ 100.64.14.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.170
+ 100.64.14.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.208
+ 100.64.10.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.171
+ 100.64.14.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.172
+ 100.64.14.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.173
+ 100.64.14.173
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.174
+ 100.64.14.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.175
+ 100.64.14.175
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.176
+ 100.64.14.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+ INCIDENT_LINK
+ 1703271350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9c25420-a0fb-11ee-b868-0b39d8f52622
+
+
+
diff --git a/graph/incidents_graphml/b/b9c52450-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b9c52450-892a-11ed-9e45-31aae3dc518d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52ea075d0dbb11937f999fd8ceaeaa2d172be69f
--- /dev/null
+++ b/graph/incidents_graphml/b/b9c52450-892a-11ed-9e45-31aae3dc518d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.83
+ 100.64.91.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1672505211
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9c52450-892a-11ed-9e45-31aae3dc518d
+
+
+
diff --git a/graph/incidents_graphml/b/b9ce5380-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/b9ce5380-3d0d-11ee-ba1f-812391e2855d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcb86bf7d6c3321a6bf8e39abae062d08f27bef3
--- /dev/null
+++ b/graph/incidents_graphml/b/b9ce5380-3d0d-11ee-ba1f-812391e2855d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.250
+ 100.64.61.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283965
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9ce5380-3d0d-11ee-ba1f-812391e2855d
+
+
+
diff --git a/graph/incidents_graphml/b/b9d0c840-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b9d0c840-f924-11ed-a4ab-835920bf1a34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de7690cb99b6001229e4aaefa902a8aa97480541
--- /dev/null
+++ b/graph/incidents_graphml/b/b9d0c840-f924-11ed-a4ab-835920bf1a34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.165
+ 100.64.10.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684817165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9d0c840-f924-11ed-a4ab-835920bf1a34
+
+
+
diff --git a/graph/incidents_graphml/b/b9d232a0-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/b/b9d232a0-a0fb-11ee-b868-0b39d8f52622.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c095faf8e91b15925e11bebd7cb9e18737e9c80d
--- /dev/null
+++ b/graph/incidents_graphml/b/b9d232a0-a0fb-11ee-b868-0b39d8f52622.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.165
+ 100.64.14.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703271351
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9d232a0-a0fb-11ee-b868-0b39d8f52622
+
+
+
diff --git a/graph/incidents_graphml/b/b9e22910-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/b/b9e22910-131d-11ee-8854-7b8acd154f2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6921ca29a60283c8c859cfc6511498fde16a910f
--- /dev/null
+++ b/graph/incidents_graphml/b/b9e22910-131d-11ee-8854-7b8acd154f2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.221
+ 100.64.24.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687672888
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b9e22910-131d-11ee-8854-7b8acd154f2f
+
+
+
diff --git a/graph/incidents_graphml/b/b9e7aba0-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b9e7aba0-f924-11ed-a4ab-835920bf1a34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0cb3af8dfd1b93c462244697436d3aaf9989dae8
--- /dev/null
+++ b/graph/incidents_graphml/b/b9e7aba0-f924-11ed-a4ab-835920bf1a34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.165
+ 100.64.10.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684817165
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9e7aba0-f924-11ed-a4ab-835920bf1a34
+
+
+
diff --git a/graph/incidents_graphml/b/b9ef9b20-57bc-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/b/b9ef9b20-57bc-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62fca7a2231fdfeedb13b1152637f86d162001fc
--- /dev/null
+++ b/graph/incidents_graphml/b/b9ef9b20-57bc-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.119
+ 100.64.11.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695217858
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9ef9b20-57bc-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695217858
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9ef9b20-57bc-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/b/b9f38ec0-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/b9f38ec0-3d0d-11ee-ba1f-812391e2855d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be77264c273fb30f8f9ca5f16ce1b36d36617225
--- /dev/null
+++ b/graph/incidents_graphml/b/b9f38ec0-3d0d-11ee-ba1f-812391e2855d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.26
+ 100.64.66.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283966
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9f38ec0-3d0d-11ee-ba1f-812391e2855d
+
+
+
diff --git a/graph/incidents_graphml/b/b9fae130-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/b/b9fae130-131d-11ee-8854-7b8acd154f2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b1ebaca7748df7dd47aeb321c5b3f818a95740a
--- /dev/null
+++ b/graph/incidents_graphml/b/b9fae130-131d-11ee-8854-7b8acd154f2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.221
+ 100.64.24.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687672889
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ b9fae130-131d-11ee-8854-7b8acd154f2f
+
+
+
diff --git a/graph/incidents_graphml/b/b9fba880-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/b9fba880-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40a74803d1efc2c5dfbdec0e18681a7ebed0e658
--- /dev/null
+++ b/graph/incidents_graphml/b/b9fba880-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.77
+ 100.64.3.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708860392
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9fba880-d3d0-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/b/b9fc4290-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b9fc4290-1553-11ee-a373-07433a95fe5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e47f8c0c9de13e184d326539568e53987c0a366
--- /dev/null
+++ b/graph/incidents_graphml/b/b9fc4290-1553-11ee-a373-07433a95fe5c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.119
+ 100.64.7.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687915984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ b9fc4290-1553-11ee-a373-07433a95fe5c
+
+
+
diff --git a/graph/incidents_graphml/b/b9fd5060-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/b9fd5060-ebef-11ec-9679-75d3d6184114.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d0e4aee8a62358255c7b7c560faab30dfb31ba1
--- /dev/null
+++ b/graph/incidents_graphml/b/b9fd5060-ebef-11ec-9679-75d3d6184114.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.1
+ 100.64.80.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.250
+ 100.64.70.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b9fd5060-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ b9fd5060-ebef-11ec-9679-75d3d6184114
+
+
+
diff --git a/graph/incidents_graphml/b/ba016ae0-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/b/ba016ae0-f613-11ed-a3d6-ad85d59eee66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7feca573bc528a4d3ba32351e3f0cfa67d5435d
--- /dev/null
+++ b/graph/incidents_graphml/b/ba016ae0-f613-11ed-a3d6-ad85d59eee66.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.88
+ 100.64.73.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.220
+ 100.64.71.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.172
+ 100.64.77.172
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.173
+ 100.64.77.173
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1684480010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba016ae0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba016ae0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba016ae0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba016ae0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba016ae0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba016ae0-f613-11ed-a3d6-ad85d59eee66
+
+
+
diff --git a/graph/incidents_graphml/b/ba0513b0-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/ba0513b0-258f-11ee-aa0d-9950110e3974.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cd1234e01bd58c82ffd10814bb8040ae500b4b1
--- /dev/null
+++ b/graph/incidents_graphml/b/ba0513b0-258f-11ee-aa0d-9950110e3974.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.39
+ 100.64.25.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689700972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba0513b0-258f-11ee-aa0d-9950110e3974
+
+
+
diff --git a/graph/incidents_graphml/b/ba17e3d0-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/ba17e3d0-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c1852f5abd5c3a7989c16560d1b678d28901ba1
--- /dev/null
+++ b/graph/incidents_graphml/b/ba17e3d0-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.22
+ 100.64.35.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844362
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba17e3d0-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/ba2015c0-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/ba2015c0-258f-11ee-aa0d-9950110e3974.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ee1c9a1dad8c33a4a77ed7cc53ce1832ae40746
--- /dev/null
+++ b/graph/incidents_graphml/b/ba2015c0-258f-11ee-aa0d-9950110e3974.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.39
+ 100.64.25.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689700972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba2015c0-258f-11ee-aa0d-9950110e3974
+
+
+
diff --git a/graph/incidents_graphml/b/ba2215f0-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/ba2215f0-fe9d-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed0adb673cd9a73499a97ca4b1aa94f120a360e9
--- /dev/null
+++ b/graph/incidents_graphml/b/ba2215f0-fe9d-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,705 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.129
+ 100.64.18.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.130
+ 100.64.18.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.18
+ 100.64.7.18
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.131
+ 100.64.18.131
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.132
+ 100.64.18.132
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.133
+ 100.64.18.133
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.134
+ 100.64.18.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.135
+ 100.64.18.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.136
+ 100.64.18.136
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.137
+ 100.64.18.137
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.138
+ 100.64.18.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.139
+ 100.64.18.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.140
+ 100.64.18.140
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.144
+ 100.64.12.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.141
+ 100.64.18.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.142
+ 100.64.18.142
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba2215f0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/b/ba24dc20-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/ba24dc20-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc2d688ccd7ecaceed21e0a0d54a1f45de66049d
--- /dev/null
+++ b/graph/incidents_graphml/b/ba24dc20-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.22
+ 100.64.35.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844362
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba24dc20-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/ba2533b0-2ff4-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/b/ba2533b0-2ff4-11ee-b00f-c1ca007fb916.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd738696050e3031256fe54c0d63590176d32986
--- /dev/null
+++ b/graph/incidents_graphml/b/ba2533b0-2ff4-11ee-b00f-c1ca007fb916.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.26
+ 100.64.58.26
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690843863
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba2533b0-2ff4-11ee-b00f-c1ca007fb916
+
+
+ INCIDENT_LINK
+ 1690843863
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba2533b0-2ff4-11ee-b00f-c1ca007fb916
+
+
+
diff --git a/graph/incidents_graphml/b/ba333d20-029b-11ed-9608-918c8d74993e.graphml b/graph/incidents_graphml/b/ba333d20-029b-11ed-9608-918c8d74993e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1d7303ab5cd5457e117e17a31585442eca5260b
--- /dev/null
+++ b/graph/incidents_graphml/b/ba333d20-029b-11ed-9608-918c8d74993e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.151
+ 100.64.61.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657710338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba333d20-029b-11ed-9608-918c8d74993e
+
+
+
diff --git a/graph/incidents_graphml/b/ba33a930-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/ba33a930-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17bddb5ae997f70cf589ea4a3fb180d69b8fe583
--- /dev/null
+++ b/graph/incidents_graphml/b/ba33a930-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.245
+ 100.64.54.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844362
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba33a930-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/ba37f810-029b-11ed-9608-918c8d74993e.graphml b/graph/incidents_graphml/b/ba37f810-029b-11ed-9608-918c8d74993e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..139218f09ac6f9f95a871982b81443fee8574924
--- /dev/null
+++ b/graph/incidents_graphml/b/ba37f810-029b-11ed-9608-918c8d74993e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.69
+ 100.64.80.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657710338
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba37f810-029b-11ed-9608-918c8d74993e
+
+
+
diff --git a/graph/incidents_graphml/b/ba392060-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/ba392060-fe9d-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0f6af3b6a2cfe9b47e227d22dd03e0fc9cc8811
--- /dev/null
+++ b/graph/incidents_graphml/b/ba392060-fe9d-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.159
+ 100.64.18.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba392060-fe9d-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/b/ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72.graphml b/graph/incidents_graphml/b/ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d017fda65988fdd150dd111f01fa9c4a20ed82b
--- /dev/null
+++ b/graph/incidents_graphml/b/ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.212
+ 100.64.68.212
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1711616043
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711616043
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72
+
+
+
diff --git a/graph/incidents_graphml/b/ba3b5920-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/ba3b5920-634c-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7ee16a953046d8d2a77e42ecfdf888e676c43d9
--- /dev/null
+++ b/graph/incidents_graphml/b/ba3b5920-634c-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.60
+ 100.64.9.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696489168
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba3b5920-634c-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/b/ba424f30-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/ba424f30-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fed22bb0897981fd63eb538f921582e578d2a2ea
--- /dev/null
+++ b/graph/incidents_graphml/b/ba424f30-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.245
+ 100.64.54.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844362
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ba424f30-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/ba50c920-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/ba50c920-f135-11ec-9654-cb9d1f320859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e2f626fda65950ae155f5333d50e558e6eee877
--- /dev/null
+++ b/graph/incidents_graphml/b/ba50c920-f135-11ec-9654-cb9d1f320859.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.157
+ USER-0015-1703.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.33
+ 100.64.75.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655797360
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba50c920-f135-11ec-9654-cb9d1f320859
+
+
+ INCIDENT_LINK
+ 1655797360
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba50c920-f135-11ec-9654-cb9d1f320859
+
+
+
diff --git a/graph/incidents_graphml/b/ba529bd0-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/ba529bd0-fe9d-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2deb37a646afe3ee52c56b601f20adabc1bec301
--- /dev/null
+++ b/graph/incidents_graphml/b/ba529bd0-fe9d-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.159
+ 100.64.18.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685418890
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba529bd0-fe9d-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/b/ba52ccf0-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/ba52ccf0-a5e0-11ee-af6c-2f69bce079e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5819363e1e6d701219d2c09d1188d87f6588b33d
--- /dev/null
+++ b/graph/incidents_graphml/b/ba52ccf0-a5e0-11ee-af6c-2f69bce079e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.217
+ 100.64.27.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703809511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba52ccf0-a5e0-11ee-af6c-2f69bce079e5
+
+
+
diff --git a/graph/incidents_graphml/b/ba574590-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/ba574590-634c-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..955e4b93f3bf6012721543f73c9427276129f9d4
--- /dev/null
+++ b/graph/incidents_graphml/b/ba574590-634c-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.62
+ 100.64.9.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696489169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba574590-634c-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/b/ba5de6f0-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/ba5de6f0-ebef-11ec-9679-75d3d6184114.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03c1b7b528ea902e539e4af45e4ceb7961333dc7
--- /dev/null
+++ b/graph/incidents_graphml/b/ba5de6f0-ebef-11ec-9679-75d3d6184114.graphml
@@ -0,0 +1,243 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.28
+ 100.64.1.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.212
+ 100.64.73.212
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.2
+ 100.64.80.2
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.3
+ 100.64.80.3
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.4
+ 100.64.80.4
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.5
+ 100.64.80.5
+ ["Exploiting Target"]
+ 0.7525
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.6
+ 100.64.80.6
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217539
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba5de6f0-ebef-11ec-9679-75d3d6184114
+
+
+
diff --git a/graph/incidents_graphml/b/ba613b40-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/ba613b40-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97a560213c6f884824aa16d4a2199c5e689f2396
--- /dev/null
+++ b/graph/incidents_graphml/b/ba613b40-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.44
+ 100.64.72.44
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba613b40-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/b/ba6320a0-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/ba6320a0-a5e0-11ee-af6c-2f69bce079e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fac376deceb5858296c1476f67cbcd3b7b5f6396
--- /dev/null
+++ b/graph/incidents_graphml/b/ba6320a0-a5e0-11ee-af6c-2f69bce079e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.217
+ 100.64.27.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703809511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ba6320a0-a5e0-11ee-af6c-2f69bce079e5
+
+
+
diff --git a/graph/incidents_graphml/b/ba6f2690-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/ba6f2690-f135-11ec-9654-cb9d1f320859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98028c57a9acb3acbef24be1328e46b5b0719bbb
--- /dev/null
+++ b/graph/incidents_graphml/b/ba6f2690-f135-11ec-9654-cb9d1f320859.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.34
+ USER-0015-1704.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655797360
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba6f2690-f135-11ec-9654-cb9d1f320859
+
+
+
diff --git a/graph/incidents_graphml/b/ba742f90-2cea-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/b/ba742f90-2cea-11ee-b828-99998b56933c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dbfce59854f6acfcdb4a8fef7443b0c4de18e55a
--- /dev/null
+++ b/graph/incidents_graphml/b/ba742f90-2cea-11ee-b828-99998b56933c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.235.180
+ 192.168.235.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.234
+ 100.64.82.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690509715
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba742f90-2cea-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690509715
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba742f90-2cea-11ee-b828-99998b56933c
+
+
+
diff --git a/graph/incidents_graphml/b/ba74df90-2824-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/b/ba74df90-2824-11ef-b581-4d62d2263ef1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0b684797ae7ba1eb60decd20a666ff2c5a30a14
--- /dev/null
+++ b/graph/incidents_graphml/b/ba74df90-2824-11ef-b581-4d62d2263ef1.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.121
+ 100.64.97.121
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.153
+ 100.64.94.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.122
+ 100.64.97.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.210
+ 100.64.40.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.123
+ 100.64.97.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.41.118
+ 100.64.41.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.77
+ 100.64.3.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.252
+ 100.64.38.252
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.124
+ 100.64.97.124
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.125
+ 100.64.97.125
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.116
+ 100.64.51.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.126
+ 100.64.97.126
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132368
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ba74df90-2824-11ef-b581-4d62d2263ef1
+
+
+
diff --git a/graph/incidents_graphml/b/ba78b040-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/ba78b040-634c-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d1412926102adf1fef83183738bd79391231b04
--- /dev/null
+++ b/graph/incidents_graphml/b/ba78b040-634c-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.64
+ 100.64.9.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696489169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba78b040-634c-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/b/ba85b330-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/ba85b330-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a69d03014acda307d1dc2203ee4676280d996dbc
--- /dev/null
+++ b/graph/incidents_graphml/b/ba85b330-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.44
+ 100.64.72.44
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ba85b330-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/b/ba933ba0-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/b/ba933ba0-3150-11ee-9a81-45e5b946e7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9616a162cb67136bdcd877db04ba4ee19d9a4f90
--- /dev/null
+++ b/graph/incidents_graphml/b/ba933ba0-3150-11ee-9a81-45e5b946e7a5.graphml
@@ -0,0 +1,561 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.118
+ 100.64.9.118
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.119
+ 100.64.9.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.121
+ 100.64.9.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.123
+ 100.64.9.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.124
+ 100.64.9.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.125
+ 100.64.9.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.127
+ 100.64.9.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.128
+ 100.64.9.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.129
+ 100.64.9.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.130
+ 100.64.9.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.131
+ 100.64.9.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba933ba0-3150-11ee-9a81-45e5b946e7a5
+
+
+
diff --git a/graph/incidents_graphml/b/ba9fac70-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/ba9fac70-f135-11ec-9654-cb9d1f320859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e74ce56c680849bde8e29240ae3895305da21b0
--- /dev/null
+++ b/graph/incidents_graphml/b/ba9fac70-f135-11ec-9654-cb9d1f320859.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.38
+ 100.64.75.38
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655797360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ba9fac70-f135-11ec-9654-cb9d1f320859
+
+
+
diff --git a/graph/incidents_graphml/b/baa87d70-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/baa87d70-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3efa7158f5c7c0b0636a72f0f4cc020873744b7b
--- /dev/null
+++ b/graph/incidents_graphml/b/baa87d70-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,207 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.167
+ 100.64.72.167
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.194
+ 100.64.82.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.195
+ 100.64.82.195
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.196
+ 100.64.82.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.199
+ 100.64.72.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.197
+ 100.64.82.197
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baa87d70-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baa87d70-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baa87d70-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baa87d70-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baa87d70-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baa87d70-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baa87d70-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baa87d70-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010176
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baa87d70-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/b/baaa0b20-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/baaa0b20-ebef-11ec-9679-75d3d6184114.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06efa2d0fd890a49593a65e57cc3c526e5714a8e
--- /dev/null
+++ b/graph/incidents_graphml/b/baaa0b20-ebef-11ec-9679-75d3d6184114.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.231
+ 100.64.43.231
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.91
+ 100.64.72.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655217540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ baaa0b20-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ baaa0b20-ebef-11ec-9679-75d3d6184114
+
+
+
diff --git a/graph/incidents_graphml/b/baada910-3fad-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/b/baada910-3fad-11ef-931a-1d289e4afac0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3821cb308eb90fd5898c79233ed64d5af91fb59b
--- /dev/null
+++ b/graph/incidents_graphml/b/baada910-3fad-11ef-931a-1d289e4afac0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.238
+ 100.64.66.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.238.61
+ 172.30.238.61
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720720086
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ baada910-3fad-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720720086
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ baada910-3fad-11ef-931a-1d289e4afac0
+
+
+
diff --git a/graph/incidents_graphml/b/bab51340-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/bab51340-3c0b-11ee-8ad1-f5005abd06b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6728423a9358c829d3a300c0f623f11135385b9
--- /dev/null
+++ b/graph/incidents_graphml/b/bab51340-3c0b-11ee-8ad1-f5005abd06b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.64
+ 100.64.85.64
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692173157
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bab51340-3c0b-11ee-8ad1-f5005abd06b8
+
+
+
diff --git a/graph/incidents_graphml/b/bab51da0-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/b/bab51da0-210c-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f33037d41aace5442cf037805fa8ec0d2fb1b0e1
--- /dev/null
+++ b/graph/incidents_graphml/b/bab51da0-210c-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.46
+ 100.64.22.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689204905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bab51da0-210c-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/b/bab8d380-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bab8d380-d30b-11ee-ab07-630a66777c1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e66d9209de7fce5ed1fae8b07bca84d65b00ef6
--- /dev/null
+++ b/graph/incidents_graphml/b/bab8d380-d30b-11ee-ab07-630a66777c1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.176
+ 100.64.38.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708775782
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bab8d380-d30b-11ee-ab07-630a66777c1a
+
+
+
diff --git a/graph/incidents_graphml/b/bac42460-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/bac42460-f135-11ec-9654-cb9d1f320859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41f2129dd8c8436932829d6a4e3f96e932ba26e7
--- /dev/null
+++ b/graph/incidents_graphml/b/bac42460-f135-11ec-9654-cb9d1f320859.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.38
+ 100.64.75.38
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655797361
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bac42460-f135-11ec-9654-cb9d1f320859
+
+
+
diff --git a/graph/incidents_graphml/b/bacd9000-56b4-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/b/bacd9000-56b4-11ee-be44-f1fe26834d88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bb61541b450298d4e799cc7d4c251e956879e3b
--- /dev/null
+++ b/graph/incidents_graphml/b/bacd9000-56b4-11ee-be44-f1fe26834d88.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1695104472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bacd9000-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bacd9000-56b4-11ee-be44-f1fe26834d88
+
+
+
diff --git a/graph/incidents_graphml/b/bad0a5a0-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/bad0a5a0-ba66-11ed-ace2-c7d81fb15087.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a6012f377a9a06a2affa27421a1b139192df9ea
--- /dev/null
+++ b/graph/incidents_graphml/b/bad0a5a0-ba66-11ed-ace2-c7d81fb15087.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.226
+ USER-0015-1727.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.16.70
+ 100.64.16.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.16.193
+ 100.64.16.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.223
+ 100.64.75.223
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.85
+ 100.64.71.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.224
+ 100.64.75.224
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.225
+ 100.64.75.225
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.226
+ 100.64.75.226
+ ["Exploiting Target","Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.227
+ 100.64.75.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.225
+ 100.64.71.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.228
+ 100.64.75.228
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.229
+ 100.64.75.229
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918590
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bad0a5a0-ba66-11ed-ace2-c7d81fb15087
+
+
+
diff --git a/graph/incidents_graphml/b/bad580e0-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/bad580e0-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49fa5834d918936077b5ac65dc7e7657169ee722
--- /dev/null
+++ b/graph/incidents_graphml/b/bad580e0-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.192
+ 100.64.82.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687010177
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bad580e0-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/b/bae06630-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/bae06630-39e0-11ee-b92b-37d2cd449a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f85c87e4074cdb860f008434bafba51d5889793
--- /dev/null
+++ b/graph/incidents_graphml/b/bae06630-39e0-11ee-b92b-37d2cd449a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.215
+ 100.64.31.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691934786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bae06630-39e0-11ee-b92b-37d2cd449a32
+
+
+
diff --git a/graph/incidents_graphml/b/bae2cff0-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/bae2cff0-f135-11ec-9654-cb9d1f320859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..651002302224bb80ce668361ce3f4aecf08bf523
--- /dev/null
+++ b/graph/incidents_graphml/b/bae2cff0-f135-11ec-9654-cb9d1f320859.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.97
+ USER-0015-1705.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655797361
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bae2cff0-f135-11ec-9654-cb9d1f320859
+
+
+
diff --git a/graph/incidents_graphml/b/bae9b7d0-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/bae9b7d0-3c0b-11ee-8ad1-f5005abd06b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d7dccae4e95adaa378408db8edf12549c665fe1
--- /dev/null
+++ b/graph/incidents_graphml/b/bae9b7d0-3c0b-11ee-8ad1-f5005abd06b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.65
+ 100.64.85.65
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692173157
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bae9b7d0-3c0b-11ee-8ad1-f5005abd06b8
+
+
+
diff --git a/graph/incidents_graphml/b/baf0b590-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/baf0b590-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46d6f563cfc89c30875456ea64b8bfdbd2b4bea8
--- /dev/null
+++ b/graph/incidents_graphml/b/baf0b590-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.111
+ 100.64.7.111
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616495
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baf0b590-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/baf35f20-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/b/baf35f20-210c-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ea44ab341a23ef9082a0d88c5f77d055b357f74
--- /dev/null
+++ b/graph/incidents_graphml/b/baf35f20-210c-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.46
+ 100.64.22.46
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689204905
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ baf35f20-210c-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/b/bb034600-56b4-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/b/bb034600-56b4-11ee-be44-f1fe26834d88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0eddf8a88ac18b167f3a437d2c20e65cc9ed0e0
--- /dev/null
+++ b/graph/incidents_graphml/b/bb034600-56b4-11ee-be44-f1fe26834d88.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.97
+ 100.64.42.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.40.143
+ 100.64.40.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695104472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb034600-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb034600-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb034600-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb034600-56b4-11ee-be44-f1fe26834d88
+
+
+
diff --git a/graph/incidents_graphml/b/bb056a80-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/bb056a80-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6582579222f64d2d6e57cfd3d7e388dbc864e528
--- /dev/null
+++ b/graph/incidents_graphml/b/bb056a80-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.192
+ 100.64.82.192
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687010177
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb056a80-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/b/bb0ac840-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/bb0ac840-fe9d-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f7906f0c67af47fc9f3151155b740af64dc9b7e
--- /dev/null
+++ b/graph/incidents_graphml/b/bb0ac840-fe9d-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.161
+ 100.64.18.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685418892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb0ac840-fe9d-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/b/bb0ca2f0-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/b/bb0ca2f0-28a0-11ee-a420-712e71e90fc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..faa82c02a3adbf3b4cca1a3e2967f854d44f1a35
--- /dev/null
+++ b/graph/incidents_graphml/b/bb0ca2f0-28a0-11ee-a420-712e71e90fc3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.228
+ 100.64.59.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690038129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb0ca2f0-28a0-11ee-a420-712e71e90fc3
+
+
+
diff --git a/graph/incidents_graphml/b/bb144320-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb144320-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4559162b04e7d6485ce430214309a0032625d95
--- /dev/null
+++ b/graph/incidents_graphml/b/bb144320-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.111
+ 100.64.7.111
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616495
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb144320-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/bb152450-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bb152450-d30b-11ee-ab07-630a66777c1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7dde0048b0683f61f8a6a6204ff73f92b931fd07
--- /dev/null
+++ b/graph/incidents_graphml/b/bb152450-d30b-11ee-ab07-630a66777c1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.178
+ 100.64.38.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708775783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb152450-d30b-11ee-ab07-630a66777c1a
+
+
+
diff --git a/graph/incidents_graphml/b/bb1b9d40-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/bb1b9d40-3c0b-11ee-8ad1-f5005abd06b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8cb877fb433196352fec6eeeaf3c6b444c43c7b
--- /dev/null
+++ b/graph/incidents_graphml/b/bb1b9d40-3c0b-11ee-8ad1-f5005abd06b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.67
+ 100.64.85.67
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692173157
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb1b9d40-3c0b-11ee-8ad1-f5005abd06b8
+
+
+
diff --git a/graph/incidents_graphml/b/bb2355e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/b/bb2355e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5adef4a91981efc17a528a3e23661f58ddb83128
--- /dev/null
+++ b/graph/incidents_graphml/b/bb2355e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699175672
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb2355e0-7bbb-11ee-8a78-ffddbc4b96f0
+
+
+
diff --git a/graph/incidents_graphml/b/bb24b4b0-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bb24b4b0-d30b-11ee-ab07-630a66777c1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ab0441cd84d387a6646d1e8f53509452164d6d7
--- /dev/null
+++ b/graph/incidents_graphml/b/bb24b4b0-d30b-11ee-ab07-630a66777c1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.178
+ 100.64.38.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708775783
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb24b4b0-d30b-11ee-ab07-630a66777c1a
+
+
+
diff --git a/graph/incidents_graphml/b/bb2708c0-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/b/bb2708c0-28a0-11ee-a420-712e71e90fc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3384662aec7e7040bd1b24e0cf9f5a6dee4908ff
--- /dev/null
+++ b/graph/incidents_graphml/b/bb2708c0-28a0-11ee-a420-712e71e90fc3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.228
+ 100.64.59.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690038129
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb2708c0-28a0-11ee-a420-712e71e90fc3
+
+
+
diff --git a/graph/incidents_graphml/b/bb292ab0-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb292ab0-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..760dd3317918082102e2a2d4e040167f406710f5
--- /dev/null
+++ b/graph/incidents_graphml/b/bb292ab0-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616495
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb292ab0-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/bb29cb80-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/bb29cb80-95ae-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..792359305e6766d52815ea864f5bd4ccabfd09f4
--- /dev/null
+++ b/graph/incidents_graphml/b/bb29cb80-95ae-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.68.136.46
+ 10.68.136.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.237
+ 100.64.75.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1673881321
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb29cb80-95ae-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673881321
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb29cb80-95ae-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/b/bb2c1570-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/bb2c1570-95ae-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5bf91ae587bfb40e40952c848444c9789ff6fc7
--- /dev/null
+++ b/graph/incidents_graphml/b/bb2c1570-95ae-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.238
+ 100.64.75.238
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.221
+ 100.64.71.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1673881321
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb2c1570-95ae-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673881321
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb2c1570-95ae-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/b/bb329820-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/b/bb329820-7bbb-11ee-8a78-ffddbc4b96f0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88b4265a6d4b13e98f51c7ed51313f07c7bbfe84
--- /dev/null
+++ b/graph/incidents_graphml/b/bb329820-7bbb-11ee-8a78-ffddbc4b96f0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699175672
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb329820-7bbb-11ee-8a78-ffddbc4b96f0
+
+
+
diff --git a/graph/incidents_graphml/b/bb3667f0-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bb3667f0-d30b-11ee-ab07-630a66777c1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ec1ef955c604a3bc4ba0395071b622e8fdeeb79
--- /dev/null
+++ b/graph/incidents_graphml/b/bb3667f0-d30b-11ee-ab07-630a66777c1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.41
+ 100.64.19.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708775783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb3667f0-d30b-11ee-ab07-630a66777c1a
+
+
+
diff --git a/graph/incidents_graphml/b/bb3a8a80-a33a-11ed-a505-7f4e35fde98f.graphml b/graph/incidents_graphml/b/bb3a8a80-a33a-11ed-a505-7f4e35fde98f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06f8a9de5230e52bd6444a91375f3d6a38351b96
--- /dev/null
+++ b/graph/incidents_graphml/b/bb3a8a80-a33a-11ed-a505-7f4e35fde98f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.107
+ 100.64.78.107
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.78.189
+ 100.64.78.189
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1675370816
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb3a8a80-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370816
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb3a8a80-a33a-11ed-a505-7f4e35fde98f
+
+
+
diff --git a/graph/incidents_graphml/b/bb4453d0-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb4453d0-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..678000a4f5283497595862ce7639243f067fed81
--- /dev/null
+++ b/graph/incidents_graphml/b/bb4453d0-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616495
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb4453d0-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/bb4a3e10-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bb4a3e10-d30b-11ee-ab07-630a66777c1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..07b68fd00f63cec614a13a2f0d4c1b8c7b2f1722
--- /dev/null
+++ b/graph/incidents_graphml/b/bb4a3e10-d30b-11ee-ab07-630a66777c1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.41
+ 100.64.19.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708775783
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb4a3e10-d30b-11ee-ab07-630a66777c1a
+
+
+
diff --git a/graph/incidents_graphml/b/bb5bfa80-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb5bfa80-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..012f21054278d7a0e98ad3b6613c8bc557135953
--- /dev/null
+++ b/graph/incidents_graphml/b/bb5bfa80-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.115
+ 100.64.7.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616495
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb5bfa80-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/bb664e10-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/b/bb664e10-138b-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b8ff91eed043af130144761c0d8dd71cd0579f3
--- /dev/null
+++ b/graph/incidents_graphml/b/bb664e10-138b-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.78
+ 100.64.74.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.102
+ USER-0015-1636.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687720136
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb664e10-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720136
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb664e10-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720136
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb664e10-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720136
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb664e10-138b-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/b/bb790fc0-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/b/bb790fc0-1fe1-11ee-80ac-1985e110d782.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d944b3528b088ccfd17a78f47ce86e0a45ac63f5
--- /dev/null
+++ b/graph/incidents_graphml/b/bb790fc0-1fe1-11ee-80ac-1985e110d782.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.40
+ 100.64.57.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689076487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb790fc0-1fe1-11ee-80ac-1985e110d782
+
+
+
diff --git a/graph/incidents_graphml/b/bb8381c0-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bb8381c0-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fe7af95b1c4f1bcd5499d58493d8cfc25eb390c
--- /dev/null
+++ b/graph/incidents_graphml/b/bb8381c0-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.247
+ 100.64.54.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844364
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bb8381c0-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/bb880a30-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bb880a30-258f-11ee-aa0d-9950110e3974.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a84dc0d3a2e1bd5593fd57686bd1692fa21ca0a0
--- /dev/null
+++ b/graph/incidents_graphml/b/bb880a30-258f-11ee-aa0d-9950110e3974.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689700975
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb880a30-258f-11ee-aa0d-9950110e3974
+
+
+
diff --git a/graph/incidents_graphml/b/bb88d6e0-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb88d6e0-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29f8153cef9da8f582d064c21540c561eb270d37
--- /dev/null
+++ b/graph/incidents_graphml/b/bb88d6e0-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.115
+ 100.64.7.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616496
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb88d6e0-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/bb8a1370-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bb8a1370-6400-11ee-a904-77b5e02bdb5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49716dce43c579947c0fd15615671d6260493f35
--- /dev/null
+++ b/graph/incidents_graphml/b/bb8a1370-6400-11ee-a904-77b5e02bdb5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.183
+ 100.64.18.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696566480
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bb8a1370-6400-11ee-a904-77b5e02bdb5f
+
+
+
diff --git a/graph/incidents_graphml/b/bb91b290-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bb91b290-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a5cff4315d6e10f876a899f64e26bb6ae19e8c5
--- /dev/null
+++ b/graph/incidents_graphml/b/bb91b290-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.247
+ 100.64.54.247
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844364
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb91b290-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/bb9a7a70-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/b/bb9a7a70-1fe1-11ee-80ac-1985e110d782.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36ff572b8afde3eae0d113b6572c47b21bfdd4ea
--- /dev/null
+++ b/graph/incidents_graphml/b/bb9a7a70-1fe1-11ee-80ac-1985e110d782.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.40
+ 100.64.57.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689076487
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bb9a7a70-1fe1-11ee-80ac-1985e110d782
+
+
+
diff --git a/graph/incidents_graphml/b/bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/b/bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed957a450106a6a6ca6b3b3a5bb45de4761ba866
--- /dev/null
+++ b/graph/incidents_graphml/b/bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.88
+ 100.64.78.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.14.171
+ 100.64.14.171
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657069102
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069102
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069102
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069102
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/b/bba5ef70-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bba5ef70-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f84c2e3e0f05e7f740f105365c625622459bd39d
--- /dev/null
+++ b/graph/incidents_graphml/b/bba5ef70-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.3
+ 100.64.34.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788890
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bba5ef70-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/b/bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/b/bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6829e415499211fef8b7f07885168aa3ac4224b
--- /dev/null
+++ b/graph/incidents_graphml/b/bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.89
+ 100.64.78.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.63
+ USER-0015-1731.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657069102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/b/bba95730-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bba95730-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..464d108704f837204fc3ccb25bec2f626f65a457
--- /dev/null
+++ b/graph/incidents_graphml/b/bba95730-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.73
+ 100.64.7.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616496
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bba95730-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/bbaa3ff0-2f9a-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/b/bbaa3ff0-2f9a-11ee-812f-67af952e62fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddd2a583429d0ed4323406c564499451fb350ab4
--- /dev/null
+++ b/graph/incidents_graphml/b/bbaa3ff0-2f9a-11ee-812f-67af952e62fd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.138
+ 100.64.68.138
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690805211
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbaa3ff0-2f9a-11ee-812f-67af952e62fd
+
+
+ INCIDENT_LINK
+ 1690805211
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbaa3ff0-2f9a-11ee-812f-67af952e62fd
+
+
+
diff --git a/graph/incidents_graphml/b/bbabe5e0-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bbabe5e0-258f-11ee-aa0d-9950110e3974.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..088f404312f64d9e28c31abf2a6552eab10b26de
--- /dev/null
+++ b/graph/incidents_graphml/b/bbabe5e0-258f-11ee-aa0d-9950110e3974.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689700975
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bbabe5e0-258f-11ee-aa0d-9950110e3974
+
+
+
diff --git a/graph/incidents_graphml/b/bbb1bd20-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/b/bbb1bd20-09ab-11ef-a326-59a1bcca7fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2bb252725d19f851b0f4d1eb05e103eb7f4260c1
--- /dev/null
+++ b/graph/incidents_graphml/b/bbb1bd20-09ab-11ef-a326-59a1bcca7fdf.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.181
+ 100.64.2.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.255
+ 100.64.14.255
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714781866
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bbb1bd20-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781866
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bbb1bd20-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781866
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bbb1bd20-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781866
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bbb1bd20-09ab-11ef-a326-59a1bcca7fdf
+
+
+
diff --git a/graph/incidents_graphml/b/bbbe8810-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/bbbe8810-ba66-11ed-ace2-c7d81fb15087.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..605562709810126b18d17f91c41253402b8b8201
--- /dev/null
+++ b/graph/incidents_graphml/b/bbbe8810-ba66-11ed-ace2-c7d81fb15087.graphml
@@ -0,0 +1,669 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.16.193
+ 100.64.16.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.223
+ 100.64.75.223
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.85
+ 100.64.71.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.224
+ 100.64.75.224
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.225
+ 100.64.75.225
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.226
+ 100.64.75.226
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.227
+ 100.64.75.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.225
+ 100.64.71.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.228
+ 100.64.75.228
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.229
+ 100.64.75.229
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+ INCIDENT_LINK
+ 1677918591
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbbe8810-ba66-11ed-ace2-c7d81fb15087
+
+
+
diff --git a/graph/incidents_graphml/b/bbc122d0-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bbc122d0-3d0d-11ee-ba1f-812391e2855d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4b8aaaf1fbacad50064c70a8b09a3da20b48cd5
--- /dev/null
+++ b/graph/incidents_graphml/b/bbc122d0-3d0d-11ee-ba1f-812391e2855d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.28
+ 100.64.66.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283969
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bbc122d0-3d0d-11ee-ba1f-812391e2855d
+
+
+
diff --git a/graph/incidents_graphml/b/bbc328b0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bbc328b0-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..940ad1ecf164885527d782b9cf4bb4de87c3e6cd
--- /dev/null
+++ b/graph/incidents_graphml/b/bbc328b0-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.233
+ 100.64.80.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.178
+ 100.64.72.178
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.190
+ 100.64.72.190
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659940288
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbc328b0-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940288
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbc328b0-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940288
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbc328b0-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940288
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbc328b0-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/b/bbc36ee0-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bbc36ee0-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46a2d048e825d48e55589b59388c7b3fa0674d72
--- /dev/null
+++ b/graph/incidents_graphml/b/bbc36ee0-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.117
+ USER-0015-1185.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616496
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bbc36ee0-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/bbcf7370-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bbcf7370-258f-11ee-aa0d-9950110e3974.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbda33bab01577ce356b927741d868e463337c32
--- /dev/null
+++ b/graph/incidents_graphml/b/bbcf7370-258f-11ee-aa0d-9950110e3974.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.41
+ 100.64.25.41
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689700975
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bbcf7370-258f-11ee-aa0d-9950110e3974
+
+
+
diff --git a/graph/incidents_graphml/b/bbdfa970-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bbdfa970-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6b50e5b1ae01581e0ca6ae200cba2e07fad9728
--- /dev/null
+++ b/graph/incidents_graphml/b/bbdfa970-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.117
+ USER-0015-1185.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616496
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bbdfa970-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/bbece3e0-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/b/bbece3e0-2b35-11ef-be20-e314b24e9951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6ac1e7ca388ebae59524d2c71cd1519da115428
--- /dev/null
+++ b/graph/incidents_graphml/b/bbece3e0-2b35-11ef-be20-e314b24e9951.graphml
@@ -0,0 +1,753 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.227
+ USER-0015-2072.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.82
+ 100.64.86.82
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.228
+ 100.64.91.228
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.131
+ USER-0015-2073.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.229
+ 100.64.91.229
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.230
+ 100.64.91.230
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.133
+ USER-0015-1997.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.176
+ USER-0015-2074.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.231
+ USER-0015-2075.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.232
+ 100.64.91.232
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.233
+ USER-0015-2076.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469525
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bbece3e0-2b35-11ef-be20-e314b24e9951
+
+
+
diff --git a/graph/incidents_graphml/b/bbf55230-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bbf55230-3d0d-11ee-ba1f-812391e2855d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d46d6fe652dfb0376d9743ed48990daf63ea27f1
--- /dev/null
+++ b/graph/incidents_graphml/b/bbf55230-3d0d-11ee-ba1f-812391e2855d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.28
+ 100.64.66.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283969
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bbf55230-3d0d-11ee-ba1f-812391e2855d
+
+
+
diff --git a/graph/incidents_graphml/b/bbfb4760-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/b/bbfb4760-056f-11ee-bce7-dffdb32a6ba9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abd2ca6d176f093a0cadf56ec5039e5bb8855860
--- /dev/null
+++ b/graph/incidents_graphml/b/bbfb4760-056f-11ee-bce7-dffdb32a6ba9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.74
+ 100.64.30.74
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.161
+ 100.64.72.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686168794
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bbfb4760-056f-11ee-bce7-dffdb32a6ba9
+
+
+ INCIDENT_LINK
+ 1686168794
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bbfb4760-056f-11ee-bce7-dffdb32a6ba9
+
+
+
diff --git a/graph/incidents_graphml/b/bbfc5930-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bbfc5930-1bb2-11ee-9d11-dd09cc4c3aca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f824b520d11b9c1adf5922565aa6eb3492df598
--- /dev/null
+++ b/graph/incidents_graphml/b/bbfc5930-1bb2-11ee-9d11-dd09cc4c3aca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.119
+ 100.64.7.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688616496
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bbfc5930-1bb2-11ee-9d11-dd09cc4c3aca
+
+
+
diff --git a/graph/incidents_graphml/b/bc0039d0-9e14-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/b/bc0039d0-9e14-11ee-a5ab-8550688be6fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..164f526b47debeab97bc87f3814801f26d6d2cd7
--- /dev/null
+++ b/graph/incidents_graphml/b/bc0039d0-9e14-11ee-a5ab-8550688be6fd.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.49
+ 100.64.23.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.36.70
+ USER-0015-1535.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1702952238
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc0039d0-9e14-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952238
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc0039d0-9e14-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952238
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc0039d0-9e14-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952238
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc0039d0-9e14-11ee-a5ab-8550688be6fd
+
+
+
diff --git a/graph/incidents_graphml/b/bc046650-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bc046650-d30b-11ee-ab07-630a66777c1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b88162bb936a6dc5a51f3a86a874a20f73470d8
--- /dev/null
+++ b/graph/incidents_graphml/b/bc046650-d30b-11ee-ab07-630a66777c1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.83
+ 100.64.33.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708775784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc046650-d30b-11ee-ab07-630a66777c1a
+
+
+
diff --git a/graph/incidents_graphml/b/bc0c62d0-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bc0c62d0-6400-11ee-a904-77b5e02bdb5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15fb0694690d6351c08837b0f4f4153d807f54df
--- /dev/null
+++ b/graph/incidents_graphml/b/bc0c62d0-6400-11ee-a904-77b5e02bdb5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.20
+ 100.64.23.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696566481
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc0c62d0-6400-11ee-a904-77b5e02bdb5f
+
+
+
diff --git a/graph/incidents_graphml/b/bc0d21b0-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/b/bc0d21b0-056f-11ee-bce7-dffdb32a6ba9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b32e54852e499e3a9e873ebf4b23a2567d866db5
--- /dev/null
+++ b/graph/incidents_graphml/b/bc0d21b0-056f-11ee-bce7-dffdb32a6ba9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.80
+ 100.64.71.80
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686168795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc0d21b0-056f-11ee-bce7-dffdb32a6ba9
+
+
+ INCIDENT_LINK
+ 1686168795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc0d21b0-056f-11ee-bce7-dffdb32a6ba9
+
+
+
diff --git a/graph/incidents_graphml/b/bc0d89e0-3249-11ef-8034-87bdea2d948c.graphml b/graph/incidents_graphml/b/bc0d89e0-3249-11ef-8034-87bdea2d948c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1acc5247dff6e3a9460270d2718c0258009645c
--- /dev/null
+++ b/graph/incidents_graphml/b/bc0d89e0-3249-11ef-8034-87bdea2d948c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.134.199
+ 192.168.134.199
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.122
+ 100.64.96.122
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719247774
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc0d89e0-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247774
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc0d89e0-3249-11ef-8034-87bdea2d948c
+
+
+
diff --git a/graph/incidents_graphml/b/bc10f080-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bc10f080-3d0d-11ee-ba1f-812391e2855d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..432f43b6bfa8a8d0a20dd8611f63a65c90d6d2a9
--- /dev/null
+++ b/graph/incidents_graphml/b/bc10f080-3d0d-11ee-ba1f-812391e2855d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.76
+ 100.64.50.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283969
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc10f080-3d0d-11ee-ba1f-812391e2855d
+
+
+
diff --git a/graph/incidents_graphml/b/bc1492f0-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bc1492f0-d30b-11ee-ab07-630a66777c1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4750de29113d73c5f876e19383e45ddad846624e
--- /dev/null
+++ b/graph/incidents_graphml/b/bc1492f0-d30b-11ee-ab07-630a66777c1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.83
+ 100.64.33.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708775784
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc1492f0-d30b-11ee-ab07-630a66777c1a
+
+
+
diff --git a/graph/incidents_graphml/b/bc1874a0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bc1874a0-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f822632bd2aa4ce4ca22fdc9be7f41562582c94
--- /dev/null
+++ b/graph/incidents_graphml/b/bc1874a0-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.182
+ 100.64.76.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.71
+ 100.64.73.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659940288
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc1874a0-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940288
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc1874a0-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/b/bc1c1320-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/b/bc1c1320-1c97-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8372133311398180d8bcc45ca6bc19d964e087b3
--- /dev/null
+++ b/graph/incidents_graphml/b/bc1c1320-1c97-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.230
+ 100.64.76.230
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.48.214
+ 100.64.48.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688714851
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc1c1320-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714851
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc1c1320-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714851
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc1c1320-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714851
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc1c1320-1c97-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/b/bc1f0070-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bc1f0070-6400-11ee-a904-77b5e02bdb5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1988d9d832a7a281564b3bf20ed3d17f3b526cac
--- /dev/null
+++ b/graph/incidents_graphml/b/bc1f0070-6400-11ee-a904-77b5e02bdb5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.20
+ 100.64.23.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696566481
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc1f0070-6400-11ee-a904-77b5e02bdb5f
+
+
+
diff --git a/graph/incidents_graphml/b/bc237ae0-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/b/bc237ae0-45d0-11ee-95ea-81d84bb304b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53feef73d3378e433930e216d903147785a7221b
--- /dev/null
+++ b/graph/incidents_graphml/b/bc237ae0-45d0-11ee-95ea-81d84bb304b3.graphml
@@ -0,0 +1,581 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.163
+ 100.64.69.163
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.34.1
+ 100.64.34.1
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.164
+ 100.64.69.164
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.158
+ 100.64.23.158
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.29
+ 100.64.23.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.165
+ USER-0015-1528.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.166
+ 100.64.69.166
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.45.239
+ 100.64.45.239
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.167
+ 100.64.69.167
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.12.242
+ 100.64.12.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247330
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc237ae0-45d0-11ee-95ea-81d84bb304b3
+
+
+
diff --git a/graph/incidents_graphml/b/bc2c46e0-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bc2c46e0-6400-11ee-a904-77b5e02bdb5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..849845c0d0f5945df6874460b0b0aace6ef3d9e2
--- /dev/null
+++ b/graph/incidents_graphml/b/bc2c46e0-6400-11ee-a904-77b5e02bdb5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.162
+ 100.64.35.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696566481
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc2c46e0-6400-11ee-a904-77b5e02bdb5f
+
+
+
diff --git a/graph/incidents_graphml/b/bc2e3b90-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/b/bc2e3b90-1c97-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cee27734608560f452268c270a134ceb5d35df7c
--- /dev/null
+++ b/graph/incidents_graphml/b/bc2e3b90-1c97-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.231
+ 100.64.76.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 192.168.87.65
+ 192.168.87.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.232
+ 100.64.76.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688714851
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc2e3b90-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714851
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc2e3b90-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714851
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc2e3b90-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714851
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc2e3b90-1c97-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/b/bc3126e0-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bc3126e0-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43ce304d5735e3e5c09903b113b035ae496452fc
--- /dev/null
+++ b/graph/incidents_graphml/b/bc3126e0-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.249
+ 100.64.54.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844365
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc3126e0-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/bc3a50a0-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bc3a50a0-6400-11ee-a904-77b5e02bdb5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db8b8f32b25362db7b744ca0098393a6fc1891bc
--- /dev/null
+++ b/graph/incidents_graphml/b/bc3a50a0-6400-11ee-a904-77b5e02bdb5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.162
+ 100.64.35.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696566481
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc3a50a0-6400-11ee-a904-77b5e02bdb5f
+
+
+
diff --git a/graph/incidents_graphml/b/bc3fa5d0-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bc3fa5d0-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f524c890a54a3e19ad682df12a4275282341bb45
--- /dev/null
+++ b/graph/incidents_graphml/b/bc3fa5d0-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.249
+ 100.64.54.249
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844366
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc3fa5d0-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/bc4cec40-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bc4cec40-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..beb43e09f883e063e27a0d386cf377b3ef2b770e
--- /dev/null
+++ b/graph/incidents_graphml/b/bc4cec40-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.47
+ 100.64.8.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844366
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc4cec40-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/bc595c30-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/bc595c30-11c0-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3c75097f6bb1d5d8d012d4bbf9f96c697deed0d
--- /dev/null
+++ b/graph/incidents_graphml/b/bc595c30-11c0-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.69.182
+ 100.64.69.182
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687522998
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc595c30-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522998
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc595c30-11c0-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/b/bc5af540-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/bc5af540-6fb7-11ee-9cc4-3d6958431eea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b21d93eaf009ec9a273430192382f97f2eb090c9
--- /dev/null
+++ b/graph/incidents_graphml/b/bc5af540-6fb7-11ee-9cc4-3d6958431eea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.165
+ 100.64.10.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697854542
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc5af540-6fb7-11ee-9cc4-3d6958431eea
+
+
+
diff --git a/graph/incidents_graphml/b/bc5af600-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bc5af600-6687-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d590f5bd38192448f7ea2d2a1f0a850050852d3a
--- /dev/null
+++ b/graph/incidents_graphml/b/bc5af600-6687-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.47
+ 100.64.8.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696844366
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc5af600-6687-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/b/bc629080-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bc629080-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0697296e6023169f30342fd5d2418312a180ba16
--- /dev/null
+++ b/graph/incidents_graphml/b/bc629080-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.90.12
+ 100.64.90.12
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697446091
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bc629080-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/b/bc6ada60-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bc6ada60-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2442ed0d231f9c15b79d1571bfbaac377204cb04
--- /dev/null
+++ b/graph/incidents_graphml/b/bc6ada60-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.115
+ 100.64.68.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.158
+ USER-0015-1647.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659940289
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc6ada60-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940289
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc6ada60-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/b/bc745e40-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/bc745e40-11c0-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..880030eb4019619e9e74a3d0405bc64fe4f573b7
--- /dev/null
+++ b/graph/incidents_graphml/b/bc745e40-11c0-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.83
+ 100.64.17.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.245
+ 100.64.76.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687522999
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc745e40-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687522999
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bc745e40-11c0-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/b/bc81cdc0-ab79-11ee-a1cb-599f1b15ded5.graphml b/graph/incidents_graphml/b/bc81cdc0-ab79-11ee-a1cb-599f1b15ded5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fff6360d8e5e45faca19f7d1b499496ea66ea660
--- /dev/null
+++ b/graph/incidents_graphml/b/bc81cdc0-ab79-11ee-a1cb-599f1b15ded5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.166
+ 100.64.22.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704424983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc81cdc0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc81cdc0-ab79-11ee-a1cb-599f1b15ded5
+
+
+
diff --git a/graph/incidents_graphml/b/bc962010-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/b/bc962010-311a-11ee-87a2-613e036775fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e69d77929405b622fbf7e00e7d8df8c9d3f4e2f4
--- /dev/null
+++ b/graph/incidents_graphml/b/bc962010-311a-11ee-87a2-613e036775fd.graphml
@@ -0,0 +1,279 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.98
+ 100.64.21.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.56
+ 100.64.58.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.57
+ 100.64.58.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.184
+ 100.64.34.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.58
+ 100.64.58.58
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.152
+ 100.64.9.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.59
+ 100.64.58.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bc962010-311a-11ee-87a2-613e036775fd
+
+
+
diff --git a/graph/incidents_graphml/b/bca22db0-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/b/bca22db0-7bbb-11ee-8a78-ffddbc4b96f0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6fb051445e2bfa6793b3fc4ffb17fc687df79dc
--- /dev/null
+++ b/graph/incidents_graphml/b/bca22db0-7bbb-11ee-8a78-ffddbc4b96f0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.60
+ 100.64.24.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699175674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bca22db0-7bbb-11ee-8a78-ffddbc4b96f0
+
+
+
diff --git a/graph/incidents_graphml/b/bca324e0-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/b/bca324e0-f9fb-11ee-a91e-b385ff48b568.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a9c579be48eb0adba8f18e4cd2d537fea9a84df
--- /dev/null
+++ b/graph/incidents_graphml/b/bca324e0-f9fb-11ee-a91e-b385ff48b568.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.249
+ 100.64.27.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1713057009
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bca324e0-f9fb-11ee-a91e-b385ff48b568
+
+
+
diff --git a/graph/incidents_graphml/b/bca54770-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bca54770-6400-11ee-a904-77b5e02bdb5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76072cd7237afce2ec7d5eb674cda55b5eaf38f3
--- /dev/null
+++ b/graph/incidents_graphml/b/bca54770-6400-11ee-a904-77b5e02bdb5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.164
+ 100.64.35.164
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696566482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bca54770-6400-11ee-a904-77b5e02bdb5f
+
+
+
diff --git a/graph/incidents_graphml/b/bca980e0-bb01-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/b/bca980e0-bb01-11ed-9416-c54055a72e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc5f84994cf8df181f899566a734c64b68b1d1e6
--- /dev/null
+++ b/graph/incidents_graphml/b/bca980e0-bb01-11ed-9416-c54055a72e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.71
+ 100.64.71.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.58
+ 100.64.1.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677985165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bca980e0-bb01-11ed-9416-c54055a72e53
+
+
+
diff --git a/graph/incidents_graphml/b/bcb1e520-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/b/bcb1e520-7bbb-11ee-8a78-ffddbc4b96f0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..759910c8f961c266b902ad71866bf46771c2c125
--- /dev/null
+++ b/graph/incidents_graphml/b/bcb1e520-7bbb-11ee-8a78-ffddbc4b96f0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.60
+ 100.64.24.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699175675
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bcb1e520-7bbb-11ee-8a78-ffddbc4b96f0
+
+
+
diff --git a/graph/incidents_graphml/b/bcb7e510-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bcb7e510-6400-11ee-a904-77b5e02bdb5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..950c4e9338ffd352fccedd783182ab85c94c1ed4
--- /dev/null
+++ b/graph/incidents_graphml/b/bcb7e510-6400-11ee-a904-77b5e02bdb5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.164
+ 100.64.35.164
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696566482
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bcb7e510-6400-11ee-a904-77b5e02bdb5f
+
+
+
diff --git a/graph/incidents_graphml/b/bcbce0b0-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bcbce0b0-258f-11ee-aa0d-9950110e3974.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0702b5fa036cbd1d45bc3ed6af6a5a7f83f9dc51
--- /dev/null
+++ b/graph/incidents_graphml/b/bcbce0b0-258f-11ee-aa0d-9950110e3974.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.43
+ 100.64.25.43
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689700977
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bcbce0b0-258f-11ee-aa0d-9950110e3974
+
+
+
diff --git a/graph/incidents_graphml/b/bcc77570-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bcc77570-6400-11ee-a904-77b5e02bdb5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8cd817041bf2daee222dc7f056f4437f8b505c34
--- /dev/null
+++ b/graph/incidents_graphml/b/bcc77570-6400-11ee-a904-77b5e02bdb5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.53
+ 100.64.34.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696566482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcc77570-6400-11ee-a904-77b5e02bdb5f
+
+
+
diff --git a/graph/incidents_graphml/b/bcd24ec0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bcd24ec0-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff906779bbc1526b0d11c83ce26cbdc7787490a0
--- /dev/null
+++ b/graph/incidents_graphml/b/bcd24ec0-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.82
+ 100.64.79.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.249
+ 100.64.73.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659940289
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bcd24ec0-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940289
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bcd24ec0-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/b/bcdb1710-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bcdb1710-258f-11ee-aa0d-9950110e3974.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55463e4e50383f464da7b4bc354ef33d0e81ae18
--- /dev/null
+++ b/graph/incidents_graphml/b/bcdb1710-258f-11ee-aa0d-9950110e3974.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.45
+ 100.64.25.45
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689700977
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcdb1710-258f-11ee-aa0d-9950110e3974
+
+
+
diff --git a/graph/incidents_graphml/b/bcdde780-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bcdde780-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dadc983b9bd7158e482f23d5216db820fd98a741
--- /dev/null
+++ b/graph/incidents_graphml/b/bcdde780-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.234
+ 100.64.80.234
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659940290
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bcdde780-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940290
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bcdde780-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/b/bcea4b00-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/b/bcea4b00-3150-11ee-9a81-45e5b946e7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93db4d3583271e423abe2cbabb2e4693336b9f20
--- /dev/null
+++ b/graph/incidents_graphml/b/bcea4b00-3150-11ee-9a81-45e5b946e7a5.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.148
+ 100.64.9.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.150
+ 100.64.9.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.151
+ 100.64.9.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.152
+ 100.64.9.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.153
+ 100.64.9.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.154
+ 100.64.9.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.155
+ 100.64.9.155
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.157
+ 100.64.9.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.249
+ USER-0015-1191.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.158
+ 100.64.9.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.159
+ 100.64.9.159
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.160
+ 100.64.9.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.161
+ 100.64.9.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.162
+ 100.64.9.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.163
+ 100.64.9.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcea4b00-3150-11ee-9a81-45e5b946e7a5
+
+
+
diff --git a/graph/incidents_graphml/b/bcfa12a0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bcfa12a0-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b628727d5a3a387f5744d6302f4edcae43dacdeb
--- /dev/null
+++ b/graph/incidents_graphml/b/bcfa12a0-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.106
+ 100.64.17.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812681
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bcfa12a0-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/b/bcfa28e0-f766-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/b/bcfa28e0-f766-11ee-a32a-474576cc2660.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae237d7c930eda43f0d3b8536ee90e06e2cc035d
--- /dev/null
+++ b/graph/incidents_graphml/b/bcfa28e0-f766-11ee-a32a-474576cc2660.graphml
@@ -0,0 +1,573 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.44
+ 100.64.10.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.70.119
+ 100.64.70.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.17.69
+ 100.64.17.69
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.120
+ 100.64.70.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.91
+ 100.64.68.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.121
+ 100.64.70.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.70.122
+ 100.64.70.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.14.83
+ USER-0015-1534.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.22.24
+ 100.64.22.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.37.113
+ 100.64.37.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bcfa28e0-f766-11ee-a32a-474576cc2660
+
+
+
diff --git a/graph/incidents_graphml/b/bd04ec70-ece0-11ee-ac0b-e5fde63aeb72.graphml b/graph/incidents_graphml/b/bd04ec70-ece0-11ee-ac0b-e5fde63aeb72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fba2414e5fec8cd094005df7f40a317fbca6d83f
--- /dev/null
+++ b/graph/incidents_graphml/b/bd04ec70-ece0-11ee-ac0b-e5fde63aeb72.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.103
+ 100.64.18.103
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.12.136
+ 100.64.12.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711616048
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd04ec70-ece0-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711616048
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd04ec70-ece0-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711616048
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd04ec70-ece0-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711616048
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd04ec70-ece0-11ee-ac0b-e5fde63aeb72
+
+
+
diff --git a/graph/incidents_graphml/b/bd05b770-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/bd05b770-95ae-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe7e9314c3735aeffd361208fb712ae7a1868589
--- /dev/null
+++ b/graph/incidents_graphml/b/bd05b770-95ae-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.18
+ 100.64.6.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1673881324
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd05b770-95ae-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673881324
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd05b770-95ae-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/b/bd08f910-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/b/bd08f910-5bee-11ee-82a0-9da780b0dcc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c2e2cb1b654777b24b444bbce214920c57d19bc
--- /dev/null
+++ b/graph/incidents_graphml/b/bd08f910-5bee-11ee-82a0-9da780b0dcc4.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.225
+ 100.64.22.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695679142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bd08f910-5bee-11ee-82a0-9da780b0dcc4
+
+
+ INCIDENT_LINK
+ 1695679142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bd08f910-5bee-11ee-82a0-9da780b0dcc4
+
+
+
diff --git a/graph/incidents_graphml/b/bd0be010-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bd0be010-2d5b-11ee-9400-61c78ce5335d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65ba48daa2de99ed547c784b22a1576facc14d2f
--- /dev/null
+++ b/graph/incidents_graphml/b/bd0be010-2d5b-11ee-9400-61c78ce5335d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690558253
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd0be010-2d5b-11ee-9400-61c78ce5335d
+
+
+
diff --git a/graph/incidents_graphml/b/bd0de3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bd0de3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0494f29c9fe3846d8ed573790e7eb2347e6d92b5
--- /dev/null
+++ b/graph/incidents_graphml/b/bd0de3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.14
+ 100.64.36.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788893
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd0de3e0-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/b/bd0f1e40-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bd0f1e40-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c77bb06bd7d17323925cc8edfb5c2b587a13cf6d
--- /dev/null
+++ b/graph/incidents_graphml/b/bd0f1e40-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.203
+ 100.64.10.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826855
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd0f1e40-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/b/bd10b0b0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/bd10b0b0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..176e8012439033d1cd5a0ec8a74f32a66b2d2df5
--- /dev/null
+++ b/graph/incidents_graphml/b/bd10b0b0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.43
+ 100.64.17.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708860397
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd10b0b0-d3d0-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/b/bd247640-15a3-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/b/bd247640-15a3-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82f17466ebec495099096e21bdc22b010e6c34bb
--- /dev/null
+++ b/graph/incidents_graphml/b/bd247640-15a3-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.109
+ 100.64.23.109
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.50.99
+ 100.64.50.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687950349
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd247640-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950349
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd247640-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950349
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd247640-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950349
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd247640-15a3-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/b/bd2d71d0-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bd2d71d0-2d5b-11ee-9400-61c78ce5335d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8bd204cf2cddc0766ceb73ce6eb5d9a4c84c1cbb
--- /dev/null
+++ b/graph/incidents_graphml/b/bd2d71d0-2d5b-11ee-9400-61c78ce5335d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690558253
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd2d71d0-2d5b-11ee-9400-61c78ce5335d
+
+
+
diff --git a/graph/incidents_graphml/b/bd31faf0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bd31faf0-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03b508ae2b5b443dab808ef941862c6c200c8070
--- /dev/null
+++ b/graph/incidents_graphml/b/bd31faf0-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.235
+ 100.64.80.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.185
+ 100.64.73.185
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659940290
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd31faf0-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940290
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd31faf0-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/b/bd34f3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bd34f3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99e93c636a7260ed533ca73051de9fe0fa58e155
--- /dev/null
+++ b/graph/incidents_graphml/b/bd34f3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.14
+ 100.64.36.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788893
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd34f3e0-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/b/bd385180-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/bd385180-2ebf-11ee-9131-1117bdeaaaa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83d12050f595bfeaeb682bf1ca4dd2f14298ee56
--- /dev/null
+++ b/graph/incidents_graphml/b/bd385180-2ebf-11ee-9131-1117bdeaaaa3.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.114
+ 100.64.72.114
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.1
+ 100.64.10.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.47
+ 100.64.11.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690711154
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd385180-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711154
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd385180-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711154
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd385180-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711154
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd385180-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711154
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd385180-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711154
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd385180-2ebf-11ee-9131-1117bdeaaaa3
+
+
+
diff --git a/graph/incidents_graphml/b/bd3e9920-0be4-11ef-ba5f-4140e81db4cb.graphml b/graph/incidents_graphml/b/bd3e9920-0be4-11ef-ba5f-4140e81db4cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20b651bfe890e0d984d838a87f5433dfdcea8cf3
--- /dev/null
+++ b/graph/incidents_graphml/b/bd3e9920-0be4-11ef-ba5f-4140e81db4cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.225
+ USER-0015-2053.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1715026252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd3e9920-0be4-11ef-ba5f-4140e81db4cb
+
+
+
diff --git a/graph/incidents_graphml/b/bd49e660-6093-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/b/bd49e660-6093-11ee-a31b-270f2d0ccd3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eac483d4189d3112860a3daeada406d1ecf08930
--- /dev/null
+++ b/graph/incidents_graphml/b/bd49e660-6093-11ee-a31b-270f2d0ccd3d.graphml
@@ -0,0 +1,589 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.27
+ 100.64.69.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.11.113
+ 100.64.11.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.12.29
+ 100.64.12.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.35
+ 100.64.29.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.25.125
+ 100.64.25.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.32.161
+ 100.64.32.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.28
+ 100.64.69.28
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.17.226
+ 100.64.17.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd49e660-6093-11ee-a31b-270f2d0ccd3d
+
+
+
diff --git a/graph/incidents_graphml/b/bd4ac630-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/b/bd4ac630-2b35-11ef-be20-e314b24e9951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..225ba46437fea34645865fb10cd1ef468443b5a5
--- /dev/null
+++ b/graph/incidents_graphml/b/bd4ac630-2b35-11ef-be20-e314b24e9951.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.88.186.68
+ 10.88.186.68
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.104.209
+ USER-0015-2077.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718469528
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd4ac630-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469528
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd4ac630-2b35-11ef-be20-e314b24e9951
+
+
+
diff --git a/graph/incidents_graphml/b/bd4ac850-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/b/bd4ac850-26cd-11ee-863d-83828757c718.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7df4b6221449b39fb739a96c243f62f38f9d53fb
--- /dev/null
+++ b/graph/incidents_graphml/b/bd4ac850-26cd-11ee-863d-83828757c718.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.72
+ 100.64.25.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.162
+ 100.64.49.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd4ac850-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd4ac850-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd4ac850-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd4ac850-26cd-11ee-863d-83828757c718
+
+
+
diff --git a/graph/incidents_graphml/b/bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..482b1a283922d74cc640e517dbbcb3de2862193f
--- /dev/null
+++ b/graph/incidents_graphml/b/bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.186
+ 100.64.57.186
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788893
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3
+
+
+ INCIDENT_LINK
+ 1690788893
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/b/bd5c9840-3f5b-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/b/bd5c9840-3f5b-11ee-a7a8-a9c952ce7042.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51a4de69afe25a87aea8f6736c939ae7deb55d02
--- /dev/null
+++ b/graph/incidents_graphml/b/bd5c9840-3f5b-11ee-a7a8-a9c952ce7042.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.242
+ 100.64.69.242
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.243
+ 100.64.69.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692537374
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd5c9840-3f5b-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537374
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd5c9840-3f5b-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537374
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd5c9840-3f5b-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537374
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd5c9840-3f5b-11ee-a7a8-a9c952ce7042
+
+
+
diff --git a/graph/incidents_graphml/b/bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/b/bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0b7eacc7014eee1e916f175b5e5f044db6d4340
--- /dev/null
+++ b/graph/incidents_graphml/b/bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.217
+ 100.64.75.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.141
+ 100.64.71.141
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660528271
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528271
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/b/bd677810-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/b/bd677810-26cd-11ee-863d-83828757c718.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18457825b1dda5416b31dc4b1296c78ffcef37d0
--- /dev/null
+++ b/graph/incidents_graphml/b/bd677810-26cd-11ee-863d-83828757c718.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.242
+ 100.64.12.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.164
+ 100.64.49.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.90
+ 100.64.31.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd677810-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd677810-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd677810-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd677810-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd677810-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd677810-26cd-11ee-863d-83828757c718
+
+
+
diff --git a/graph/incidents_graphml/b/bd67b330-b9c1-11ed-bac8-570c4bb8b980.graphml b/graph/incidents_graphml/b/bd67b330-b9c1-11ed-bac8-570c4bb8b980.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d5cc73dcd6cb8d94ef667bdfd7714039abe4008
--- /dev/null
+++ b/graph/incidents_graphml/b/bd67b330-b9c1-11ed-bac8-570c4bb8b980.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.171
+ 100.64.84.171
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677847727
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd67b330-b9c1-11ed-bac8-570c4bb8b980
+
+
+
diff --git a/graph/incidents_graphml/b/bd6a14d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/bd6a14d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ff18356c21708e00bd1aaf115e0626cddc20655
--- /dev/null
+++ b/graph/incidents_graphml/b/bd6a14d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.193
+ 100.64.16.193
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951582
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd6a14d0-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/bd6a6600-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bd6a6600-3d0d-11ee-ba1f-812391e2855d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b53210aa8e4922ef4d540870b97e20c951e16e8e
--- /dev/null
+++ b/graph/incidents_graphml/b/bd6a6600-3d0d-11ee-ba1f-812391e2855d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.31
+ 100.64.15.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283971
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bd6a6600-3d0d-11ee-ba1f-812391e2855d
+
+
+
diff --git a/graph/incidents_graphml/b/bd6e7a70-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bd6e7a70-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..171162aff7e088e4481a9657b6bef317d8e099f5
--- /dev/null
+++ b/graph/incidents_graphml/b/bd6e7a70-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.186
+ 100.64.57.186
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788893
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bd6e7a70-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/b/bd786cb0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/bd786cb0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3259c1264e1dc419df082b2426678d18cbb98c80
--- /dev/null
+++ b/graph/incidents_graphml/b/bd786cb0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.193
+ 100.64.16.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951583
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd786cb0-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/bd7cbc00-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/b/bd7cbc00-f9fb-11ee-a91e-b385ff48b568.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..113f367080c941c7b794ed94b73a5516eab2de88
--- /dev/null
+++ b/graph/incidents_graphml/b/bd7cbc00-f9fb-11ee-a91e-b385ff48b568.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.11
+ 100.64.2.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713057010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd7cbc00-f9fb-11ee-a91e-b385ff48b568
+
+
+
diff --git a/graph/incidents_graphml/b/bd7eed30-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bd7eed30-2d5b-11ee-9400-61c78ce5335d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af9b5dda22f33b3061e9941f8b8c74c81151dd92
--- /dev/null
+++ b/graph/incidents_graphml/b/bd7eed30-2d5b-11ee-9400-61c78ce5335d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.123
+ 100.64.40.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690558254
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd7eed30-2d5b-11ee-9400-61c78ce5335d
+
+
+
diff --git a/graph/incidents_graphml/b/bd7f6ce0-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/b/bd7f6ce0-26cd-11ee-863d-83828757c718.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac44c21f5052f5a5435f666623eda8d67739d433
--- /dev/null
+++ b/graph/incidents_graphml/b/bd7f6ce0-26cd-11ee-863d-83828757c718.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.167
+ 100.64.10.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.166
+ 100.64.49.166
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.87
+ 100.64.25.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.167
+ 100.64.49.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.168
+ 100.64.49.168
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837558
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd7f6ce0-26cd-11ee-863d-83828757c718
+
+
+
diff --git a/graph/incidents_graphml/b/bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/b/bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b183c2298e08e0442bd48f98a627b2b4517df921
--- /dev/null
+++ b/graph/incidents_graphml/b/bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f.graphml
@@ -0,0 +1,575 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.120
+ 100.64.48.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.136
+ 100.64.20.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.72
+ 100.64.52.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.73
+ 100.64.52.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.74
+ 100.64.52.74
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.75
+ 100.64.52.75
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.76
+ 100.64.52.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.109
+ 100.64.29.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.77
+ 100.64.52.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.176
+ 100.64.24.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.78
+ 100.64.52.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.76
+ 100.64.15.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.182
+ 100.64.27.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+
diff --git a/graph/incidents_graphml/b/bd950270-09b3-11ef-9ef0-737536dee9f3.graphml b/graph/incidents_graphml/b/bd950270-09b3-11ef-9ef0-737536dee9f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17cb94f9c94d9acb9c85037b19cff67e743aa46d
--- /dev/null
+++ b/graph/incidents_graphml/b/bd950270-09b3-11ef-9ef0-737536dee9f3.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.12
+ 100.64.2.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.82
+ 100.64.64.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.87
+ 100.64.26.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.151
+ 100.64.41.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.73
+ 100.64.26.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+ INCIDENT_LINK
+ 1714785305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bd950270-09b3-11ef-9ef0-737536dee9f3
+
+
+
diff --git a/graph/incidents_graphml/b/bd993da0-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/b/bd993da0-131d-11ee-8854-7b8acd154f2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ea18899e1066e427a1a3775c759376e52a8397d
--- /dev/null
+++ b/graph/incidents_graphml/b/bd993da0-131d-11ee-8854-7b8acd154f2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.34
+ 100.64.53.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687672895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bd993da0-131d-11ee-8854-7b8acd154f2f
+
+
+
diff --git a/graph/incidents_graphml/b/bd9b1970-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/b/bd9b1970-f9fb-11ee-a91e-b385ff48b568.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af4c79bff520048aba0b1d1f370d288cb99eddfe
--- /dev/null
+++ b/graph/incidents_graphml/b/bd9b1970-f9fb-11ee-a91e-b385ff48b568.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.11
+ 100.64.2.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1713057010
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bd9b1970-f9fb-11ee-a91e-b385ff48b568
+
+
+
diff --git a/graph/incidents_graphml/b/bda28a90-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bda28a90-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01bdbf9d09d2cdf98d65299f59b5401bed79fd1e
--- /dev/null
+++ b/graph/incidents_graphml/b/bda28a90-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.14
+ 100.64.90.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1697446093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bda28a90-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/b/bda914a0-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bda914a0-3e29-11ee-b681-89e3497f1d7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b301199a12870651dafb8c3d824321ca4331c04
--- /dev/null
+++ b/graph/incidents_graphml/b/bda914a0-3e29-11ee-b681-89e3497f1d7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.118
+ 100.64.15.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692405949
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bda914a0-3e29-11ee-b681-89e3497f1d7e
+
+
+