diff --git a/graph/incidents_graphml/b/b3616c00-4166-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/b/b3616c00-4166-11ee-89c1-af7b5492d246.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66c57f40cc191c6bb6e5f2e81c07b0ff92947c23 --- /dev/null +++ b/graph/incidents_graphml/b/b3616c00-4166-11ee-89c1-af7b5492d246.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.141 + 100.64.96.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692761984 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3616c00-4166-11ee-89c1-af7b5492d246 + + + diff --git a/graph/incidents_graphml/b/b3624cf0-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/b/b3624cf0-0c8d-11ee-af4a-2171e1d29da4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c63a5b67517e7dd986f70f9c892be59b9147e63 --- /dev/null +++ b/graph/incidents_graphml/b/b3624cf0-0c8d-11ee-af4a-2171e1d29da4.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.127 + 100.64.29.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.30.59 + 100.64.30.59 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.56 + 100.64.69.56 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1686951323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3624cf0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3624cf0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3624cf0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3624cf0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3624cf0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3624cf0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3624cf0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3624cf0-0c8d-11ee-af4a-2171e1d29da4 + + + diff --git a/graph/incidents_graphml/b/b3651920-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/b/b3651920-45d2-11ee-b6a5-451a7dc3db0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cffdc466217b2e0512ceb3828828f4416f8273f4 --- /dev/null +++ b/graph/incidents_graphml/b/b3651920-45d2-11ee-b6a5-451a7dc3db0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.93 + USER-0015-2067.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693248175 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3651920-45d2-11ee-b6a5-451a7dc3db0a + + + diff --git a/graph/incidents_graphml/b/b3653360-6b25-11ee-97c5-672d6deedc53.graphml b/graph/incidents_graphml/b/b3653360-6b25-11ee-97c5-672d6deedc53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b27a1732cceb95bbc3df237139948560991852f --- /dev/null +++ b/graph/incidents_graphml/b/b3653360-6b25-11ee-97c5-672d6deedc53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.2 + 100.64.41.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697352016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3653360-6b25-11ee-97c5-672d6deedc53 + + + diff --git a/graph/incidents_graphml/b/b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ad0331aadf31c26d5fac2c60a24f853791a4083 --- /dev/null +++ b/graph/incidents_graphml/b/b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.39 + 100.64.17.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708860381 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b369fcb0-d3d0-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/b/b36f27a0-4166-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/b/b36f27a0-4166-11ee-89c1-af7b5492d246.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad7c2dcaa096e4a423aa688532027ba9f52b71dc --- /dev/null +++ b/graph/incidents_graphml/b/b36f27a0-4166-11ee-89c1-af7b5492d246.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.143 + 100.64.96.143 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1692761984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b36f27a0-4166-11ee-89c1-af7b5492d246 + + + diff --git a/graph/incidents_graphml/b/b3763020-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/b/b3763020-45d2-11ee-b6a5-451a7dc3db0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b410b83cbc51126e71e031ab0ab5940be047aea5 --- /dev/null +++ b/graph/incidents_graphml/b/b3763020-45d2-11ee-b6a5-451a7dc3db0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.93 + USER-0015-2067.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693248175 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3763020-45d2-11ee-b6a5-451a7dc3db0a + + + diff --git a/graph/incidents_graphml/b/b37778e0-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b37778e0-24c6-11ee-aa36-6b1924b88a3a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..368c00ec478961ab6d72777193ae523e15c8595a --- /dev/null +++ b/graph/incidents_graphml/b/b37778e0-24c6-11ee-aa36-6b1924b88a3a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.127 + USER-0015-1213.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689614632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b37778e0-24c6-11ee-aa36-6b1924b88a3a + + + diff --git a/graph/incidents_graphml/b/b37ade40-6b25-11ee-97c5-672d6deedc53.graphml b/graph/incidents_graphml/b/b37ade40-6b25-11ee-97c5-672d6deedc53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc0527347d276d4eae01ff9f33ad7958752e85e9 --- /dev/null +++ b/graph/incidents_graphml/b/b37ade40-6b25-11ee-97c5-672d6deedc53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.4 + 100.64.41.4 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697352016 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b37ade40-6b25-11ee-97c5-672d6deedc53 + + + diff --git a/graph/incidents_graphml/b/b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68358de5b65755aa40f4dff51c997ef1f6b0f9ff --- /dev/null +++ b/graph/incidents_graphml/b/b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.39 + 100.64.17.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708860381 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b37dabc0-d3d0-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/b/b386dd50-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/b/b386dd50-25e6-11ee-8760-d9b0ea984292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aac4f395304843e5c29ff1da031b79b2ea20de0f --- /dev/null +++ b/graph/incidents_graphml/b/b386dd50-25e6-11ee-8760-d9b0ea984292.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.215 + 100.64.64.215 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.216 + 100.64.64.216 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.195 + 100.64.23.195 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.217 + 100.64.64.217 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.218 + 100.64.64.218 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.110 + USER-0015-1308.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.219 + 100.64.64.219 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738328 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b386dd50-25e6-11ee-8760-d9b0ea984292 + + + diff --git a/graph/incidents_graphml/b/b38f6db0-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b38f6db0-24c6-11ee-aa36-6b1924b88a3a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2577b1550c58d18139af27152f4931f7a612a89b --- /dev/null +++ b/graph/incidents_graphml/b/b38f6db0-24c6-11ee-aa36-6b1924b88a3a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.127 + USER-0015-1213.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689614633 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b38f6db0-24c6-11ee-aa36-6b1924b88a3a + + + diff --git a/graph/incidents_graphml/b/b3924530-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/b3924530-d3d0-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a5afc45a2a20a4da4a1a3f4a6e6948961b95e37 --- /dev/null +++ b/graph/incidents_graphml/b/b3924530-d3d0-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.41 + USER-0015-1211.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708860381 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3924530-d3d0-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/b/b3937c20-45d2-11ee-b6a5-451a7dc3db0a.graphml b/graph/incidents_graphml/b/b3937c20-45d2-11ee-b6a5-451a7dc3db0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae01127fce3224803ac12e0afcf2ae7b10794d42 --- /dev/null +++ b/graph/incidents_graphml/b/b3937c20-45d2-11ee-b6a5-451a7dc3db0a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.134.199 + 192.168.134.199 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.95 + 100.64.91.95 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693248175 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3937c20-45d2-11ee-b6a5-451a7dc3db0a + + + INCIDENT_LINK + 1693248175 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3937c20-45d2-11ee-b6a5-451a7dc3db0a + + + diff --git a/graph/incidents_graphml/b/b39b6230-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/b/b39b6230-3552-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c990008047040c9adea96c1ff99c863659f460a8 --- /dev/null +++ b/graph/incidents_graphml/b/b39b6230-3552-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.227.172 + USER-0015-2135.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.95.152 + 100.64.95.152 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.153 + 100.64.95.153 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.229 + 100.64.89.229 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719581478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b39b6230-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b39b6230-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b39b6230-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b39b6230-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b39b6230-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b39b6230-3552-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/b/b3ad1a10-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/b/b3ad1a10-efc3-11ec-9799-0176ac54cf1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3c01b3eb24ced8cfb45e31bc053c9478026721a --- /dev/null +++ b/graph/incidents_graphml/b/b3ad1a10-efc3-11ec-9799-0176ac54cf1b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.42 + 100.64.76.42 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.65 + 100.64.72.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655638435 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3ad1a10-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638435 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3ad1a10-efc3-11ec-9799-0176ac54cf1b + + + diff --git a/graph/incidents_graphml/b/b3b45190-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/b/b3b45190-14b1-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7a7d0b5cd5834042eafa23b827499f3db92697b --- /dev/null +++ b/graph/incidents_graphml/b/b3b45190-14b1-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.240 + 100.64.1.240 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.145 + 100.64.79.145 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.57.100 + 100.64.57.100 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687846395 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3b45190-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846395 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3b45190-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846395 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3b45190-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846395 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3b45190-14b1-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/b/b3b60140-31e7-11ee-b48d-2b64d5dc7f75.graphml b/graph/incidents_graphml/b/b3b60140-31e7-11ee-b48d-2b64d5dc7f75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba42e76b9f5964c1b5f0897406de219a64c7ecbd --- /dev/null +++ b/graph/incidents_graphml/b/b3b60140-31e7-11ee-b48d-2b64d5dc7f75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.125 + 100.64.42.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691058171 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3b60140-31e7-11ee-b48d-2b64d5dc7f75 + + + diff --git a/graph/incidents_graphml/b/b3c18a60-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b3c18a60-4b4b-11ee-a689-9b5633a6069d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f64a895947435f0a0235d22d7b40e633cc8bce4 --- /dev/null +++ b/graph/incidents_graphml/b/b3c18a60-4b4b-11ee-a689-9b5633a6069d.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.229 + 100.64.4.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693849900 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3c18a60-4b4b-11ee-a689-9b5633a6069d + + + INCIDENT_LINK + 1693849900 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3c18a60-4b4b-11ee-a689-9b5633a6069d + + + diff --git a/graph/incidents_graphml/b/b3c705f0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b3c705f0-892a-11ed-9e45-31aae3dc518d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a27e773cbc7e062b0c820458f5a1b8421b9285cc --- /dev/null +++ b/graph/incidents_graphml/b/b3c705f0-892a-11ed-9e45-31aae3dc518d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.10.72 + 100.64.10.72 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1672505201 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3c705f0-892a-11ed-9e45-31aae3dc518d + + + INCIDENT_LINK + 1672505201 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3c705f0-892a-11ed-9e45-31aae3dc518d + + + diff --git a/graph/incidents_graphml/b/b3d03060-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b3d03060-4b4b-11ee-a689-9b5633a6069d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..228fae4adde3bb4b9e0db02ec3090c0ccc8bead7 --- /dev/null +++ b/graph/incidents_graphml/b/b3d03060-4b4b-11ee-a689-9b5633a6069d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.229 + 100.64.4.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693849900 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3d03060-4b4b-11ee-a689-9b5633a6069d + + + diff --git a/graph/incidents_graphml/b/b3d17880-31e7-11ee-b48d-2b64d5dc7f75.graphml b/graph/incidents_graphml/b/b3d17880-31e7-11ee-b48d-2b64d5dc7f75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c708ef90cdb4c03262542479027cd53187539a11 --- /dev/null +++ b/graph/incidents_graphml/b/b3d17880-31e7-11ee-b48d-2b64d5dc7f75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.125 + 100.64.42.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691058172 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3d17880-31e7-11ee-b48d-2b64d5dc7f75 + + + diff --git a/graph/incidents_graphml/b/b3d71530-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b3d71530-7bd2-11ee-8fcf-9fbd42a0c461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f7b4d03659b4380ed65030a714bb5317c02f89e --- /dev/null +++ b/graph/incidents_graphml/b/b3d71530-7bd2-11ee-8fcf-9fbd42a0c461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.13 + 100.64.39.13 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699185538 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3d71530-7bd2-11ee-8fcf-9fbd42a0c461 + + + diff --git a/graph/incidents_graphml/b/b3e30100-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b3e30100-a5e0-11ee-af6c-2f69bce079e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fef961703cf0190d3fddb775f929cb4fda58132d --- /dev/null +++ b/graph/incidents_graphml/b/b3e30100-a5e0-11ee-af6c-2f69bce079e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.35 + 100.64.25.35 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703809500 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3e30100-a5e0-11ee-af6c-2f69bce079e5 + + + diff --git a/graph/incidents_graphml/b/b3e713c0-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b3e713c0-4b4b-11ee-a689-9b5633a6069d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85bc25466e1ced43448b42b3d29230d6a15dba30 --- /dev/null +++ b/graph/incidents_graphml/b/b3e713c0-4b4b-11ee-a689-9b5633a6069d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.22 + 100.64.49.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693849900 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3e713c0-4b4b-11ee-a689-9b5633a6069d + + + diff --git a/graph/incidents_graphml/b/b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3be2901c91225076f88bc2f3e51b4a88cdf7446b --- /dev/null +++ b/graph/incidents_graphml/b/b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.13 + 100.64.39.13 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699185538 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b3ea00f0-7bd2-11ee-8fcf-9fbd42a0c461 + + + diff --git a/graph/incidents_graphml/b/b3ec7270-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/b/b3ec7270-3b73-11ef-b1e4-3da31b742190.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30168e6ffda95ad171160ce8bfc9d27059264489 --- /dev/null +++ b/graph/incidents_graphml/b/b3ec7270-3b73-11ef-b1e4-3da31b742190.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.24 + 100.64.46.24 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.25 + 100.64.46.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.100 + 100.64.32.100 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.26 + 100.64.46.26 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.107 + 100.64.36.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255359 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3ec7270-3b73-11ef-b1e4-3da31b742190 + + + diff --git a/graph/incidents_graphml/b/b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75.graphml b/graph/incidents_graphml/b/b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9715da8d65ba18f5ca419274708878f036fda4d --- /dev/null +++ b/graph/incidents_graphml/b/b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.202 + 100.64.20.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691058172 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3ee9d70-31e7-11ee-b48d-2b64d5dc7f75 + + + diff --git a/graph/incidents_graphml/b/b3f4a850-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b3f4a850-4b4b-11ee-a689-9b5633a6069d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be6d2a0a5b074929d5c64376222f5eec44b6166e --- /dev/null +++ b/graph/incidents_graphml/b/b3f4a850-4b4b-11ee-a689-9b5633a6069d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.22 + 100.64.49.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693849900 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3f4a850-4b4b-11ee-a689-9b5633a6069d + + + diff --git a/graph/incidents_graphml/b/b3f4d180-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b3f4d180-de41-11ed-8036-d144f5e7f2f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eba0e5621dfbfc6ccfae4e54e1eba1b546dbc08e --- /dev/null +++ b/graph/incidents_graphml/b/b3f4d180-de41-11ed-8036-d144f5e7f2f2.graphml @@ -0,0 +1,725 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.135 + 100.64.16.135 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.1.39 + 100.64.1.39 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.77.180 + 100.64.77.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.1.157 + HOST-14854 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.78.102 + 100.64.78.102 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.172 + USER-0015-1672.example.internal + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.104 + 100.64.72.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki"] + + + HOST + 100.64.78.103 + 100.64.78.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.78.104 + 100.64.78.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.27.195 + 100.64.27.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.72.73 + HOST-14855 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.14.192 + 100.64.14.192 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.181 + HOST-14580 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.1.51 + HOST-14856 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.78.105 + 100.64.78.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860929 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b3f4d180-de41-11ed-8036-d144f5e7f2f2 + + + diff --git a/graph/incidents_graphml/b/b3f7fc20-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b3f7fc20-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01527bce688a9d4fdb81d84d0caea973464905a9 --- /dev/null +++ b/graph/incidents_graphml/b/b3f7fc20-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.201 + 100.64.26.201 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909039 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3f7fc20-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b3fca1f0-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b3fca1f0-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f5d442bab8c8596a7fbffcff1ab929e7a58a2b7 --- /dev/null +++ b/graph/incidents_graphml/b/b3fca1f0-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.186 + 100.64.8.186 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b3fca1f0-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b3ffc5b0-6b25-11ee-97c5-672d6deedc53.graphml b/graph/incidents_graphml/b/b3ffc5b0-6b25-11ee-97c5-672d6deedc53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4e37c6c1c1f0ec2bc9198bc391199e89b538680 --- /dev/null +++ b/graph/incidents_graphml/b/b3ffc5b0-6b25-11ee-97c5-672d6deedc53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697352017 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b3ffc5b0-6b25-11ee-97c5-672d6deedc53 + + + diff --git a/graph/incidents_graphml/b/b4062cf0-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b4062cf0-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb417205d3975c68fc250ed2ec02b0becb4f3abc --- /dev/null +++ b/graph/incidents_graphml/b/b4062cf0-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.16 + 100.64.43.16 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909040 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4062cf0-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b408cc90-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b408cc90-4b4b-11ee-a689-9b5633a6069d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57535b35b0b345ba7f5bec66788cc25130e15680 --- /dev/null +++ b/graph/incidents_graphml/b/b408cc90-4b4b-11ee-a689-9b5633a6069d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.148 + 100.64.9.148 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693849901 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b408cc90-4b4b-11ee-a689-9b5633a6069d + + + diff --git a/graph/incidents_graphml/b/b40f2f00-6b25-11ee-97c5-672d6deedc53.graphml b/graph/incidents_graphml/b/b40f2f00-6b25-11ee-97c5-672d6deedc53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2548e94065d3b09506e359a4e146ceaf1e87f2a8 --- /dev/null +++ b/graph/incidents_graphml/b/b40f2f00-6b25-11ee-97c5-672d6deedc53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697352017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b40f2f00-6b25-11ee-97c5-672d6deedc53 + + + diff --git a/graph/incidents_graphml/b/b41186b0-076a-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/b/b41186b0-076a-11ef-93a8-d78cfa287885.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50e60e5ea8fc6d4b0e39777968e730f91c7692d6 --- /dev/null +++ b/graph/incidents_graphml/b/b41186b0-076a-11ef-93a8-d78cfa287885.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.68 + 100.64.65.68 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1714534034 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b41186b0-076a-11ef-93a8-d78cfa287885 + + + diff --git a/graph/incidents_graphml/b/b4146550-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b4146550-4b4b-11ee-a689-9b5633a6069d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99f8246640d15070847b995ef0344023e25f286d --- /dev/null +++ b/graph/incidents_graphml/b/b4146550-4b4b-11ee-a689-9b5633a6069d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.226 + 100.64.14.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693849901 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4146550-4b4b-11ee-a689-9b5633a6069d + + + diff --git a/graph/incidents_graphml/b/b4186cb0-21b9-11ee-ad82-796ed23e6009.graphml b/graph/incidents_graphml/b/b4186cb0-21b9-11ee-ad82-796ed23e6009.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1786a8b9106189b03c9c14ebb684ea03fbcd2c12 --- /dev/null +++ b/graph/incidents_graphml/b/b4186cb0-21b9-11ee-ad82-796ed23e6009.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.43 + USER-0015-1244.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689279197 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4186cb0-21b9-11ee-ad82-796ed23e6009 + + + diff --git a/graph/incidents_graphml/b/b41aa6f0-2800-11ed-b924-cd5cf98263a8.graphml b/graph/incidents_graphml/b/b41aa6f0-2800-11ed-b924-cd5cf98263a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62c10c3eaeb3de825be8d44094651b756258e386 --- /dev/null +++ b/graph/incidents_graphml/b/b41aa6f0-2800-11ed-b924-cd5cf98263a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.80.157 + 100.64.80.157 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661821900 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b41aa6f0-2800-11ed-b924-cd5cf98263a8 + + + diff --git a/graph/incidents_graphml/b/b41d1050-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b41d1050-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13ab98dc444ca78109e55101c867c1b120ba8805 --- /dev/null +++ b/graph/incidents_graphml/b/b41d1050-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.16 + 100.64.43.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909040 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b41d1050-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b41ffe10-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b41ffe10-4b4b-11ee-a689-9b5633a6069d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4590fcf74c269a9040078eaa602810a34b42b000 --- /dev/null +++ b/graph/incidents_graphml/b/b41ffe10-4b4b-11ee-a689-9b5633a6069d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.226 + 100.64.14.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693849901 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b41ffe10-4b4b-11ee-a689-9b5633a6069d + + + diff --git a/graph/incidents_graphml/b/b4372a80-70e5-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/b/b4372a80-70e5-11ee-adf7-3be9df66b766.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d530c3a158cd38b50b20067d0212144b10115ca5 --- /dev/null +++ b/graph/incidents_graphml/b/b4372a80-70e5-11ee-adf7-3be9df66b766.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.76 + 100.64.68.76 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1697984236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4372a80-70e5-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4372a80-70e5-11ee-adf7-3be9df66b766 + + + diff --git a/graph/incidents_graphml/b/b439c7a0-4b4b-11ee-a689-9b5633a6069d.graphml b/graph/incidents_graphml/b/b439c7a0-4b4b-11ee-a689-9b5633a6069d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb2f425f52ab1817098914b4d20d07d4cb14d592 --- /dev/null +++ b/graph/incidents_graphml/b/b439c7a0-4b4b-11ee-a689-9b5633a6069d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.29 + 100.64.12.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693849901 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b439c7a0-4b4b-11ee-a689-9b5633a6069d + + + diff --git a/graph/incidents_graphml/b/b4436050-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/b4436050-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28d76a7e6818e32c2bdb9a85b6fe69abeb70a077 --- /dev/null +++ b/graph/incidents_graphml/b/b4436050-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.29.5 + 100.64.29.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678367832 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4436050-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/b/b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91a6a9a200471667e8914c023f9a960283042c8e --- /dev/null +++ b/graph/incidents_graphml/b/b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.193 + 100.64.12.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699185539 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b44dcbd0-7bd2-11ee-8fcf-9fbd42a0c461 + + + diff --git a/graph/incidents_graphml/b/b4507610-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b4507610-6c8b-11ee-8c03-355f988cf3d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5212b879d30b80d9b08b23460a62b70b2627662 --- /dev/null +++ b/graph/incidents_graphml/b/b4507610-6c8b-11ee-8c03-355f988cf3d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.155 + 100.64.56.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697505777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4507610-6c8b-11ee-8c03-355f988cf3d5 + + + diff --git a/graph/incidents_graphml/b/b4546070-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b4546070-a5e0-11ee-af6c-2f69bce079e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..397fe872212bd24faedf1e7733f06d0923259d9e --- /dev/null +++ b/graph/incidents_graphml/b/b4546070-a5e0-11ee-af6c-2f69bce079e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.243 + 100.64.18.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703809501 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4546070-a5e0-11ee-af6c-2f69bce079e5 + + + diff --git a/graph/incidents_graphml/b/b45ab2e0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/b45ab2e0-11c0-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9ece61bcdec6b8cb52998e40885ad88b34f48ae --- /dev/null +++ b/graph/incidents_graphml/b/b45ab2e0-11c0-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.228 + 100.64.12.228 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.217 + 100.64.74.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.109 + 100.64.82.109 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687522985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b45ab2e0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b45ab2e0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b45ab2e0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b45ab2e0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b45ab2e0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b45ab2e0-11c0-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/b/b46117e0-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b46117e0-6c8b-11ee-8c03-355f988cf3d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea78879fff8e66fc6a0b6afd54f6de6fbc4cdefc --- /dev/null +++ b/graph/incidents_graphml/b/b46117e0-6c8b-11ee-8c03-355f988cf3d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.155 + 100.64.56.155 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697505777 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b46117e0-6c8b-11ee-8c03-355f988cf3d5 + + + diff --git a/graph/incidents_graphml/b/b4659e80-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b4659e80-a5e0-11ee-af6c-2f69bce079e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a63372bf46d19d8f572358c013d1c57f7c1638b --- /dev/null +++ b/graph/incidents_graphml/b/b4659e80-a5e0-11ee-af6c-2f69bce079e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.243 + 100.64.18.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703809501 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b4659e80-a5e0-11ee-af6c-2f69bce079e5 + + + diff --git a/graph/incidents_graphml/b/b4661fa0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/b4661fa0-b6de-11ed-9d21-f346d8153a36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0124aa7b8bb877f049c4d30d587fcfdfcc52410f --- /dev/null +++ b/graph/incidents_graphml/b/b4661fa0-b6de-11ed-9d21-f346d8153a36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.91.199 + 100.64.91.199 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677530314 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b4661fa0-b6de-11ed-9d21-f346d8153a36 + + + diff --git a/graph/incidents_graphml/b/b46953f0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/b46953f0-b6de-11ed-9d21-f346d8153a36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88ef08abfd7324f50ceaad481dd10dbabd4a9f40 --- /dev/null +++ b/graph/incidents_graphml/b/b46953f0-b6de-11ed-9d21-f346d8153a36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.201 + 100.64.91.201 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677530314 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b46953f0-b6de-11ed-9d21-f346d8153a36 + + + diff --git a/graph/incidents_graphml/b/b46d99b0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/b46d99b0-b6de-11ed-9d21-f346d8153a36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9958cd4e08d474e92938a62e3c6e09f87135644f --- /dev/null +++ b/graph/incidents_graphml/b/b46d99b0-b6de-11ed-9d21-f346d8153a36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.201 + 100.64.91.201 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677530314 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b46d99b0-b6de-11ed-9d21-f346d8153a36 + + + diff --git a/graph/incidents_graphml/b/b46db540-1291-11ed-83c9-c740e142a095.graphml b/graph/incidents_graphml/b/b46db540-1291-11ed-83c9-c740e142a095.graphml new file mode 100644 index 0000000000000000000000000000000000000000..243a0a14477eb49e62cd6acdf96da3473ee5504c --- /dev/null +++ b/graph/incidents_graphml/b/b46db540-1291-11ed-83c9-c740e142a095.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.19.54.137 + 172.19.54.137 + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.89.226 + 100.64.89.226 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659465252 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b46db540-1291-11ed-83c9-c740e142a095 + + + INCIDENT_LINK + 1659465252 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b46db540-1291-11ed-83c9-c740e142a095 + + + diff --git a/graph/incidents_graphml/b/b47730b0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b47730b0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcd9a4cee8a8ea738ec60d50afaa5e32e94ce633 --- /dev/null +++ b/graph/incidents_graphml/b/b47730b0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.46 + 100.64.21.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691969994 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b47730b0-3a32-11ee-a0d4-2bfcb77b8e2b + + + diff --git a/graph/incidents_graphml/b/b47762a0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/b47762a0-11c0-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..636501cbac7fced5a837f9d1754f856dd625338c --- /dev/null +++ b/graph/incidents_graphml/b/b47762a0-11c0-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.103 + 100.64.10.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.42 + 100.64.72.42 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.220 + 100.64.72.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687522985 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b47762a0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522985 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b47762a0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522985 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b47762a0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522985 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b47762a0-11c0-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/b/b47c8960-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/b/b47c8960-0cf7-11ee-aa7f-c3325e1e3407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ff9d29b375770c63577f20807c27d45608ec311 --- /dev/null +++ b/graph/incidents_graphml/b/b47c8960-0cf7-11ee-aa7f-c3325e1e3407.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.59 + 100.64.75.59 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686996852 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b47c8960-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996852 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b47c8960-0cf7-11ee-aa7f-c3325e1e3407 + + + diff --git a/graph/incidents_graphml/b/b47fb4a0-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b47fb4a0-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5e0225763b2651b92f42a85f499359f7ea9dc40 --- /dev/null +++ b/graph/incidents_graphml/b/b47fb4a0-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.128 + 100.64.15.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b47fb4a0-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b480c9f0-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b480c9f0-a1f6-11ee-8be4-0756a5149684.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2dc4ae57c6704ed2a74feb5ef0060c074fa4aa90 --- /dev/null +++ b/graph/incidents_graphml/b/b480c9f0-a1f6-11ee-8be4-0756a5149684.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.128 + 100.64.47.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379145 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b480c9f0-a1f6-11ee-8be4-0756a5149684 + + + INCIDENT_LINK + 1703379145 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b480c9f0-a1f6-11ee-8be4-0756a5149684 + + + diff --git a/graph/incidents_graphml/b/b48557c0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b48557c0-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f946acd2dcc6f527c11e659fbb66aaf0763122f9 --- /dev/null +++ b/graph/incidents_graphml/b/b48557c0-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.37 + 100.64.39.37 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854529 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b48557c0-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/b48b0c80-2824-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/b/b48b0c80-2824-11ef-b581-4d62d2263ef1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62c834f1180cfda6ca87bb74b8c33fedc4da189c --- /dev/null +++ b/graph/incidents_graphml/b/b48b0c80-2824-11ef-b581-4d62d2263ef1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.135.111 + 172.16.135.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory","Stealthwatch"] + + + HOST + 100.64.97.120 + 100.64.97.120 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718132358 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b48b0c80-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132358 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b48b0c80-2824-11ef-b581-4d62d2263ef1 + + + diff --git a/graph/incidents_graphml/b/b48da480-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/b/b48da480-6327-11ee-84e8-6f3a76e74a81.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d07da2365eaad24430523df9b72c875a43a53213 --- /dev/null +++ b/graph/incidents_graphml/b/b48da480-6327-11ee-84e8-6f3a76e74a81.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.58 + 100.64.21.58 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696473267 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b48da480-6327-11ee-84e8-6f3a76e74a81 + + + diff --git a/graph/incidents_graphml/b/b48f6c10-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b48f6c10-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2dbc5bd48499a2ba91e6c063ba40134913776739 --- /dev/null +++ b/graph/incidents_graphml/b/b48f6c10-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.128 + 100.64.15.128 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740020 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b48f6c10-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b4900fe0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b4900fe0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b549a0fc6f8c8d2c64623c693b8c5d718a58180 --- /dev/null +++ b/graph/incidents_graphml/b/b4900fe0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.219 + 100.64.53.219 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691969994 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b4900fe0-3a32-11ee-a0d4-2bfcb77b8e2b + + + diff --git a/graph/incidents_graphml/b/b4949a00-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b4949a00-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3f2404ad14f4623967c1ad2b1d40dd6d564f3c7 --- /dev/null +++ b/graph/incidents_graphml/b/b4949a00-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.37 + 100.64.39.37 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854529 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b4949a00-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/b49523d0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/b49523d0-11c0-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3ce89a391ba301f88d787f715566e9d9e411dba --- /dev/null +++ b/graph/incidents_graphml/b/b49523d0-11c0-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.110 + 100.64.82.110 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687522985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49523d0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49523d0-11c0-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/b/b49c7190-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/b/b49c7190-6327-11ee-84e8-6f3a76e74a81.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f1eb93bbce8f9b49510f3dcb79853379b2b4f9d --- /dev/null +++ b/graph/incidents_graphml/b/b49c7190-6327-11ee-84e8-6f3a76e74a81.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.58 + 100.64.21.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696473268 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b49c7190-6327-11ee-84e8-6f3a76e74a81 + + + diff --git a/graph/incidents_graphml/b/b49c8f50-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b49c8f50-a1f6-11ee-8be4-0756a5149684.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a45c56aa624beff35dfc5888c39256dedf1bbe94 --- /dev/null +++ b/graph/incidents_graphml/b/b49c8f50-a1f6-11ee-8be4-0756a5149684.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.129 + 100.64.62.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379145 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b49c8f50-a1f6-11ee-8be4-0756a5149684 + + + diff --git a/graph/incidents_graphml/b/b49c9480-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/b/b49c9480-0cf7-11ee-aa7f-c3325e1e3407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bde1e9520b0e8b09e3a3b1278b8fbc0c15282741 --- /dev/null +++ b/graph/incidents_graphml/b/b49c9480-0cf7-11ee-aa7f-c3325e1e3407.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.28 + USER-0015-1710.example.internal + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.60 + 100.64.75.60 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.61 + USER-0015-1711.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.62 + 100.64.75.62 + ["Exploiting Target","Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.63 + 100.64.75.63 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686996852 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49c9480-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996852 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49c9480-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996852 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49c9480-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996852 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49c9480-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996852 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49c9480-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996852 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49c9480-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996852 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49c9480-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996852 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49c9480-0cf7-11ee-aa7f-c3325e1e3407 + + + diff --git a/graph/incidents_graphml/b/b49e4520-1eb1-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/b/b49e4520-1eb1-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0d96a24d8330f6e7f9a5db98553de7351ad12fe --- /dev/null +++ b/graph/incidents_graphml/b/b49e4520-1eb1-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,351 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.1 + 100.64.64.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.2 + 100.64.64.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.218 + 100.64.14.218 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.158 + 100.64.55.158 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.3 + 100.64.64.3 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.227 + 100.64.40.227 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.12 + 100.64.9.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.88 + 100.64.37.88 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.4 + 100.64.64.4 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945908 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b49e4520-1eb1-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/b/b4a02cb0-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b4a02cb0-de41-11ed-8036-d144f5e7f2f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08fd3f573217a10ed1089a5e2debc5a9fdd24a92 --- /dev/null +++ b/graph/incidents_graphml/b/b4a02cb0-de41-11ed-8036-d144f5e7f2f2.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.13 + 100.64.39.13 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.57 + 100.64.72.57 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.78.106 + 100.64.78.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.19.83 + 100.64.19.83 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1681860930 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a02cb0-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860930 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a02cb0-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860930 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a02cb0-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860930 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a02cb0-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860930 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a02cb0-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860930 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a02cb0-de41-11ed-8036-d144f5e7f2f2 + + + diff --git a/graph/incidents_graphml/b/b4a0aa20-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b4a0aa20-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0131989e2993866847be9a692c413b15998ce19 --- /dev/null +++ b/graph/incidents_graphml/b/b4a0aa20-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.130 + 100.64.15.130 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740020 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b4a0aa20-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b4a74170-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/b/b4a74170-25e6-11ee-8760-d9b0ea984292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d016492671fb06dccfce2e4d222ef35b461e8bf3 --- /dev/null +++ b/graph/incidents_graphml/b/b4a74170-25e6-11ee-8760-d9b0ea984292.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.186 + 100.64.13.186 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.71 + 100.64.7.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.225 + 100.64.64.225 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.105 + 100.64.14.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.98 + 100.64.16.98 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.10 + 100.64.46.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.226 + 100.64.64.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.215 + 100.64.28.215 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.113 + 100.64.57.113 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.227 + USER-0015-1463.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.228 + 100.64.64.228 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.229 + 100.64.64.229 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.125 + 100.64.26.125 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.172 + 100.64.49.172 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.88 + 100.64.41.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.243 + 100.64.40.243 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.230 + 100.64.64.230 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.231 + 100.64.64.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a74170-25e6-11ee-8760-d9b0ea984292 + + + diff --git a/graph/incidents_graphml/b/b4a78bd0-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b4a78bd0-a1f6-11ee-8be4-0756a5149684.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40fa018db144ee630694fac0700e932e1a5876e0 --- /dev/null +++ b/graph/incidents_graphml/b/b4a78bd0-a1f6-11ee-8be4-0756a5149684.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.242 + 100.64.8.242 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379146 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a78bd0-a1f6-11ee-8be4-0756a5149684 + + + diff --git a/graph/incidents_graphml/b/b4a8ef10-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b4a8ef10-3a32-11ee-a0d4-2bfcb77b8e2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b56d32bac086db801f7dee74b219d554ff62af08 --- /dev/null +++ b/graph/incidents_graphml/b/b4a8ef10-3a32-11ee-a0d4-2bfcb77b8e2b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.221 + 100.64.53.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691969995 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4a8ef10-3a32-11ee-a0d4-2bfcb77b8e2b + + + diff --git a/graph/incidents_graphml/b/b4b631d0-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b4b631d0-a1f6-11ee-8be4-0756a5149684.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa3f77ebfed28f1699dfb316be5e4967587fde74 --- /dev/null +++ b/graph/incidents_graphml/b/b4b631d0-a1f6-11ee-8be4-0756a5149684.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.242 + 100.64.8.242 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379146 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b4b631d0-a1f6-11ee-8be4-0756a5149684 + + + diff --git a/graph/incidents_graphml/b/b4befa60-4e02-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/b/b4befa60-4e02-11ee-b83a-49677896a1e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..299a917be523ccfabd09ea625ec6ab2b5c7fc4b9 --- /dev/null +++ b/graph/incidents_graphml/b/b4befa60-4e02-11ee-b83a-49677896a1e8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.206 + 100.64.47.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694148402 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4befa60-4e02-11ee-b83a-49677896a1e8 + + + diff --git a/graph/incidents_graphml/b/b4c5b120-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/b/b4c5b120-e560-11ee-be14-8bb84b2c14a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9da8d751b0e3477987725bbd2f2c21ba323cc84d --- /dev/null +++ b/graph/incidents_graphml/b/b4c5b120-e560-11ee-be14-8bb84b2c14a8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.95 + 100.64.68.95 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1710791400 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4c5b120-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791400 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4c5b120-e560-11ee-be14-8bb84b2c14a8 + + + diff --git a/graph/incidents_graphml/b/b4d149e0-4e02-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/b/b4d149e0-4e02-11ee-b83a-49677896a1e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26e249d901bd2fc313a26c68af5d44cc9af4d4ce --- /dev/null +++ b/graph/incidents_graphml/b/b4d149e0-4e02-11ee-b83a-49677896a1e8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.206 + 100.64.47.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694148402 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b4d149e0-4e02-11ee-b83a-49677896a1e8 + + + diff --git a/graph/incidents_graphml/b/b4dab4b0-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b4dab4b0-6c8b-11ee-8c03-355f988cf3d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7ce519e110446e77e876f7d9edc0ba012082f89 --- /dev/null +++ b/graph/incidents_graphml/b/b4dab4b0-6c8b-11ee-8c03-355f988cf3d5.graphml @@ -0,0 +1,533 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.157 + 100.64.56.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.158 + 100.64.56.158 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.159 + 100.64.56.159 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.59 + HOST-2863 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.83 + 100.64.11.83 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.160 + 100.64.56.160 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.76 + 100.64.54.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.213 + 100.64.18.213 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.244 + 100.64.35.244 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.161 + 100.64.56.161 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.162 + USER-0015-1416.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.163 + 100.64.56.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4dab4b0-6c8b-11ee-8c03-355f988cf3d5 + + + diff --git a/graph/incidents_graphml/b/b4e5c510-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b4e5c510-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..774ff862bb667de98393caafee677dc1dc049f5e --- /dev/null +++ b/graph/incidents_graphml/b/b4e5c510-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.234 + 100.64.46.234 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.235 + 100.64.46.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.236 + 100.64.46.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.233 + 100.64.24.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915975 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4e5c510-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915975 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4e5c510-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915975 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4e5c510-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915975 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4e5c510-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915975 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4e5c510-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915975 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4e5c510-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915975 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4e5c510-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915975 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4e5c510-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b4ebf2c0-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b4ebf2c0-6c8b-11ee-8c03-355f988cf3d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b4ff835c9554b18e723c8ad0deb10c057b0737c --- /dev/null +++ b/graph/incidents_graphml/b/b4ebf2c0-6c8b-11ee-8c03-355f988cf3d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.157 + 100.64.56.157 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697505778 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b4ebf2c0-6c8b-11ee-8c03-355f988cf3d5 + + + diff --git a/graph/incidents_graphml/b/b4edba40-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b4edba40-a5e0-11ee-af6c-2f69bce079e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..251330e8cd2a081aedda19e03f9609698c83461a --- /dev/null +++ b/graph/incidents_graphml/b/b4edba40-a5e0-11ee-af6c-2f69bce079e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.64 + 100.64.36.64 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703809502 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b4edba40-a5e0-11ee-af6c-2f69bce079e5 + + + diff --git a/graph/incidents_graphml/b/b4f91220-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b4f91220-6c8b-11ee-8c03-355f988cf3d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56692365a206a3cc86c1f1de06de3de3a15577fb --- /dev/null +++ b/graph/incidents_graphml/b/b4f91220-6c8b-11ee-8c03-355f988cf3d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.171 + 100.64.56.171 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697505778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4f91220-6c8b-11ee-8c03-355f988cf3d5 + + + diff --git a/graph/incidents_graphml/b/b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77.graphml b/graph/incidents_graphml/b/b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37072f7da58864d5975883cf7061421a4589fef1 --- /dev/null +++ b/graph/incidents_graphml/b/b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.54 + 100.64.41.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700787992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77 + + + INCIDENT_LINK + 1700787992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b4fbe0c0-8a65-11ee-a23c-e7bfb59a1c77 + + + diff --git a/graph/incidents_graphml/b/b5031950-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b5031950-a1f6-11ee-8be4-0756a5149684.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4800006d6efeef5cef23dca5b0be906f7dd1e56d --- /dev/null +++ b/graph/incidents_graphml/b/b5031950-a1f6-11ee-8be4-0756a5149684.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.186 + 100.64.49.186 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5031950-a1f6-11ee-8be4-0756a5149684 + + + diff --git a/graph/incidents_graphml/b/b50709b0-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b50709b0-7bd2-11ee-8fcf-9fbd42a0c461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e784097c2387955c5346de1d99991f235e98673e --- /dev/null +++ b/graph/incidents_graphml/b/b50709b0-7bd2-11ee-8fcf-9fbd42a0c461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.15 + 100.64.39.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699185540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b50709b0-7bd2-11ee-8fcf-9fbd42a0c461 + + + diff --git a/graph/incidents_graphml/b/b5098ce0-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b5098ce0-6c8b-11ee-8c03-355f988cf3d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08c4833a2a89937728e81dc933b40cbe4166fd1f --- /dev/null +++ b/graph/incidents_graphml/b/b5098ce0-6c8b-11ee-8c03-355f988cf3d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.171 + 100.64.56.171 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697505778 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b5098ce0-6c8b-11ee-8c03-355f988cf3d5 + + + diff --git a/graph/incidents_graphml/b/b509d3c0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b509d3c0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..600ca899fe8e3143c55e4b9317ee69531fcae93f --- /dev/null +++ b/graph/incidents_graphml/b/b509d3c0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.93 + 100.64.47.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691969995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b509d3c0-3a32-11ee-a0d4-2bfcb77b8e2b + + + diff --git a/graph/incidents_graphml/b/b50a4d40-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/b/b50a4d40-3150-11ee-9a81-45e5b946e7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..729d61e982d2de250a98de389a52e6d03c183e45 --- /dev/null +++ b/graph/incidents_graphml/b/b50a4d40-3150-11ee-9a81-45e5b946e7a5.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.78 + 100.64.9.78 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.79 + 100.64.9.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.80 + 100.64.9.80 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.81 + 100.64.9.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.82 + 100.64.9.82 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993320 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50a4d40-3150-11ee-9a81-45e5b946e7a5 + + + diff --git a/graph/incidents_graphml/b/b50cf7c0-8a65-11ee-a23c-e7bfb59a1c77.graphml b/graph/incidents_graphml/b/b50cf7c0-8a65-11ee-a23c-e7bfb59a1c77.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ee0cfdca151790847d70f27fcd593d532accf04 --- /dev/null +++ b/graph/incidents_graphml/b/b50cf7c0-8a65-11ee-a23c-e7bfb59a1c77.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.54 + 100.64.41.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700787992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b50cf7c0-8a65-11ee-a23c-e7bfb59a1c77 + + + diff --git a/graph/incidents_graphml/b/b50f9a70-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b50f9a70-6503-11ee-b447-a9f06618d419.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d75777b599d96a84394841f3f6fde9c7f5a612da --- /dev/null +++ b/graph/incidents_graphml/b/b50f9a70-6503-11ee-b447-a9f06618d419.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.43.19 + 192.168.43.19 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.251 + 100.64.89.251 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696677709 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50f9a70-6503-11ee-b447-a9f06618d419 + + + INCIDENT_LINK + 1696677709 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b50f9a70-6503-11ee-b447-a9f06618d419 + + + diff --git a/graph/incidents_graphml/b/b510ade0-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b510ade0-a1f6-11ee-8be4-0756a5149684.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e29f73d4cf8fa7248813ebb62353a4c273a24a2 --- /dev/null +++ b/graph/incidents_graphml/b/b510ade0-a1f6-11ee-8be4-0756a5149684.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.186 + 100.64.49.186 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379146 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b510ade0-a1f6-11ee-8be4-0756a5149684 + + + diff --git a/graph/incidents_graphml/b/b5172170-6c8b-11ee-8c03-355f988cf3d5.graphml b/graph/incidents_graphml/b/b5172170-6c8b-11ee-8c03-355f988cf3d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b0eddc92d51fedba892f876d52f496732bbbcc0 --- /dev/null +++ b/graph/incidents_graphml/b/b5172170-6c8b-11ee-8c03-355f988cf3d5.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.222 + 100.64.13.222 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697505779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5172170-6c8b-11ee-8c03-355f988cf3d5 + + + INCIDENT_LINK + 1697505779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5172170-6c8b-11ee-8c03-355f988cf3d5 + + + diff --git a/graph/incidents_graphml/b/b5178470-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b5178470-7bd2-11ee-8fcf-9fbd42a0c461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..185a9b51be0bef897c9dd775cde9416fe94cdcac --- /dev/null +++ b/graph/incidents_graphml/b/b5178470-7bd2-11ee-8fcf-9fbd42a0c461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.15 + 100.64.39.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699185540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b5178470-7bd2-11ee-8fcf-9fbd42a0c461 + + + diff --git a/graph/incidents_graphml/b/b51bc4d0-8a65-11ee-a23c-e7bfb59a1c77.graphml b/graph/incidents_graphml/b/b51bc4d0-8a65-11ee-a23c-e7bfb59a1c77.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c92c2af2564ce2002f118e88685cd81be0094bc --- /dev/null +++ b/graph/incidents_graphml/b/b51bc4d0-8a65-11ee-a23c-e7bfb59a1c77.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.239 + 100.64.26.239 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700787993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b51bc4d0-8a65-11ee-a23c-e7bfb59a1c77 + + + diff --git a/graph/incidents_graphml/b/b51e9090-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b51e9090-a1f6-11ee-8be4-0756a5149684.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7759f7e7f62b0e4e213a0145c0c0e738da5902c --- /dev/null +++ b/graph/incidents_graphml/b/b51e9090-a1f6-11ee-8be4-0756a5149684.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.143 + 100.64.32.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379146 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b51e9090-a1f6-11ee-8be4-0756a5149684 + + + diff --git a/graph/incidents_graphml/b/b51f78f0-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b51f78f0-6503-11ee-b447-a9f06618d419.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9442ae72b21c8be7c0048f3ce1d0d33636f17602 --- /dev/null +++ b/graph/incidents_graphml/b/b51f78f0-6503-11ee-b447-a9f06618d419.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.253 + 100.64.89.253 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1696677709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b51f78f0-6503-11ee-b447-a9f06618d419 + + + diff --git a/graph/incidents_graphml/b/b520b720-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b520b720-3a32-11ee-a0d4-2bfcb77b8e2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9caf010430c6c675bb2871d59e66f2a29eec39c --- /dev/null +++ b/graph/incidents_graphml/b/b520b720-3a32-11ee-a0d4-2bfcb77b8e2b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.93 + 100.64.47.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691969995 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b520b720-3a32-11ee-a0d4-2bfcb77b8e2b + + + diff --git a/graph/incidents_graphml/b/b5216bd0-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/b/b5216bd0-1411-11ee-918c-e193118b03e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfdab069e00ed8958120b00a79111ec413961cc9 --- /dev/null +++ b/graph/incidents_graphml/b/b5216bd0-1411-11ee-918c-e193118b03e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.76 + 100.64.65.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687777678 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5216bd0-1411-11ee-918c-e193118b03e7 + + + diff --git a/graph/incidents_graphml/b/b5301ac0-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b5301ac0-6503-11ee-b447-a9f06618d419.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae7d01488b2608f047dd8eaa44b1dc9721f19e30 --- /dev/null +++ b/graph/incidents_graphml/b/b5301ac0-6503-11ee-b447-a9f06618d419.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.89.253 + 100.64.89.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696677709 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b5301ac0-6503-11ee-b447-a9f06618d419 + + + diff --git a/graph/incidents_graphml/b/b537e670-21b9-11ee-ad82-796ed23e6009.graphml b/graph/incidents_graphml/b/b537e670-21b9-11ee-ad82-796ed23e6009.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7b07249a8437be29397f6fd54f34b67952c4ffc --- /dev/null +++ b/graph/incidents_graphml/b/b537e670-21b9-11ee-ad82-796ed23e6009.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.177 + 100.64.23.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689279199 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b537e670-21b9-11ee-ad82-796ed23e6009 + + + diff --git a/graph/incidents_graphml/b/b53c0750-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b53c0750-3a32-11ee-a0d4-2bfcb77b8e2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d5f8cbbcf609538b11ea1d8b39b9a00af01392d --- /dev/null +++ b/graph/incidents_graphml/b/b53c0750-3a32-11ee-a0d4-2bfcb77b8e2b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.223 + 100.64.53.223 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691969996 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b53c0750-3a32-11ee-a0d4-2bfcb77b8e2b + + + diff --git a/graph/incidents_graphml/b/b541ec20-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/b/b541ec20-1411-11ee-918c-e193118b03e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea177fddaf5f1caa59162e99f4522a1aa04aeeba --- /dev/null +++ b/graph/incidents_graphml/b/b541ec20-1411-11ee-918c-e193118b03e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.76 + 100.64.65.76 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687777678 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b541ec20-1411-11ee-918c-e193118b03e7 + + + diff --git a/graph/incidents_graphml/b/b5447da0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/b5447da0-2ebf-11ee-9131-1117bdeaaaa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12857abc8e38c2385dbd80468028f0f4f058ae97 --- /dev/null +++ b/graph/incidents_graphml/b/b5447da0-2ebf-11ee-9131-1117bdeaaaa3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.110 + 100.64.72.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Meraki","Precinct"] + + + INCIDENT_LINK + 1690711141 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5447da0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711141 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5447da0-2ebf-11ee-9131-1117bdeaaaa3 + + + diff --git a/graph/incidents_graphml/b/b54cb910-503f-11ee-b697-c3310c70b120.graphml b/graph/incidents_graphml/b/b54cb910-503f-11ee-b697-c3310c70b120.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d6c4c44e42c6196d1071a273c37c5f597aa74f5 --- /dev/null +++ b/graph/incidents_graphml/b/b54cb910-503f-11ee-b697-c3310c70b120.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694394504 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b54cb910-503f-11ee-b697-c3310c70b120 + + + diff --git a/graph/incidents_graphml/b/b55773a0-7bd2-11ee-8fcf-9fbd42a0c461.graphml b/graph/incidents_graphml/b/b55773a0-7bd2-11ee-8fcf-9fbd42a0c461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea23b1eef3eb938443fe4b4883d3d45568a5ca1b --- /dev/null +++ b/graph/incidents_graphml/b/b55773a0-7bd2-11ee-8fcf-9fbd42a0c461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.17 + 100.64.39.17 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699185541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b55773a0-7bd2-11ee-8fcf-9fbd42a0c461 + + + diff --git a/graph/incidents_graphml/b/b557a740-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b557a740-56c5-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..526d4b007ae5ba3193e6373dd1765840239dd8d2 --- /dev/null +++ b/graph/incidents_graphml/b/b557a740-56c5-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.192 + 100.64.75.192 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666964266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b557a740-56c5-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/b/b55cfe70-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b55cfe70-56c5-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24554e5394efe6e8eba6f34170a625b238d2d263 --- /dev/null +++ b/graph/incidents_graphml/b/b55cfe70-56c5-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.75.192 + 100.64.75.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1666964266 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b55cfe70-56c5-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/b/b55d7200-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b55d7200-3a32-11ee-a0d4-2bfcb77b8e2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..597164d606281da8da326e7369deb793bd1ecd19 --- /dev/null +++ b/graph/incidents_graphml/b/b55d7200-3a32-11ee-a0d4-2bfcb77b8e2b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.223 + 100.64.53.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691969996 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b55d7200-3a32-11ee-a0d4-2bfcb77b8e2b + + + diff --git a/graph/incidents_graphml/b/b55fb120-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b55fb120-3fb2-11ee-b2f5-ad594961d736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..743b3421e03ae4376dba6dbed4becda904da7de7 --- /dev/null +++ b/graph/incidents_graphml/b/b55fb120-3fb2-11ee-b2f5-ad594961d736.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.163 + 100.64.18.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692574727 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b55fb120-3fb2-11ee-b2f5-ad594961d736 + + + diff --git a/graph/incidents_graphml/b/b5615fe0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b5615fe0-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99945b051c0e356c3cc90c531119d0c8bd977308 --- /dev/null +++ b/graph/incidents_graphml/b/b5615fe0-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.166 + 100.64.53.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854530 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5615fe0-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/b566f7e0-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/b/b566f7e0-6092-11ee-a31b-270f2d0ccd3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..334baaa2ed728e04719c4a7288dd4f77de2e0abf --- /dev/null +++ b/graph/incidents_graphml/b/b566f7e0-6092-11ee-a31b-270f2d0ccd3d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.21 + 100.64.68.21 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1696189371 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b566f7e0-6092-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189371 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b566f7e0-6092-11ee-a31b-270f2d0ccd3d + + + diff --git a/graph/incidents_graphml/b/b56a6820-21b9-11ee-ad82-796ed23e6009.graphml b/graph/incidents_graphml/b/b56a6820-21b9-11ee-ad82-796ed23e6009.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4afc960a879318b73eb101699c6561206d039aba --- /dev/null +++ b/graph/incidents_graphml/b/b56a6820-21b9-11ee-ad82-796ed23e6009.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.177 + 100.64.23.177 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689279199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b56a6820-21b9-11ee-ad82-796ed23e6009 + + + diff --git a/graph/incidents_graphml/b/b56f4180-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b56f4180-3fb2-11ee-b2f5-ad594961d736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aac154a13ab097a2b3e6b5c2b998a3fe3a2154f4 --- /dev/null +++ b/graph/incidents_graphml/b/b56f4180-3fb2-11ee-b2f5-ad594961d736.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.163 + 100.64.18.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692574727 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b56f4180-3fb2-11ee-b2f5-ad594961d736 + + + diff --git a/graph/incidents_graphml/b/b56f69a0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b56f69a0-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c38d2b5d04697ee29078f2f30556b2835dc35ece --- /dev/null +++ b/graph/incidents_graphml/b/b56f69a0-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.166 + 100.64.53.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854530 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b56f69a0-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/b57e8e90-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b57e8e90-3a32-11ee-a0d4-2bfcb77b8e2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64fd8ee248533049a3699945806da001cda76e6c --- /dev/null +++ b/graph/incidents_graphml/b/b57e8e90-3a32-11ee-a0d4-2bfcb77b8e2b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.105 + 100.64.11.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691969996 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b57e8e90-3a32-11ee-a0d4-2bfcb77b8e2b + + + diff --git a/graph/incidents_graphml/b/b585cf70-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/b/b585cf70-21fe-11ef-a065-0d11f2930c39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f2db6b4e37ef094ea886fc8ca072d92962ca9c5 --- /dev/null +++ b/graph/incidents_graphml/b/b585cf70-21fe-11ef-a065-0d11f2930c39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.151 + 100.64.32.151 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717456332 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b585cf70-21fe-11ef-a065-0d11f2930c39 + + + diff --git a/graph/incidents_graphml/b/b5874e70-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/b5874e70-0ebf-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d18d5b433220649372a739ce8b918a4cfc016ee --- /dev/null +++ b/graph/incidents_graphml/b/b5874e70-0ebf-11ee-9392-932bfd273540.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.47 + 100.64.17.47 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.202 + 100.64.72.202 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.18.251 + 100.64.18.251 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.29.49 + 100.64.29.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687192704 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b5874e70-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192704 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b5874e70-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192704 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b5874e70-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192704 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b5874e70-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192704 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b5874e70-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192704 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b5874e70-0ebf-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/b/b587aae0-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/b/b587aae0-056f-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b8cbca808f86b7af5801b9f63cd453e210a2295 --- /dev/null +++ b/graph/incidents_graphml/b/b587aae0-056f-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.53 + 100.64.75.53 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.75.54 + 100.64.75.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1686168784 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b587aae0-056f-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686168784 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b587aae0-056f-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/b/b5883070-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b5883070-24c6-11ee-aa36-6b1924b88a3a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68b60b82af8283bd4ecee38a514c042cf1b6f30a --- /dev/null +++ b/graph/incidents_graphml/b/b5883070-24c6-11ee-aa36-6b1924b88a3a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.57 + 100.64.17.57 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689614636 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5883070-24c6-11ee-aa36-6b1924b88a3a + + + diff --git a/graph/incidents_graphml/b/b59fd720-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b59fd720-24c6-11ee-aa36-6b1924b88a3a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13afa33244f4833ef30f58dd10d0adcfca8df3a6 --- /dev/null +++ b/graph/incidents_graphml/b/b59fd720-24c6-11ee-aa36-6b1924b88a3a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.57 + 100.64.17.57 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689614636 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b59fd720-24c6-11ee-aa36-6b1924b88a3a + + + diff --git a/graph/incidents_graphml/b/b5a230e0-9daa-11ed-a07d-2388b6eb4361.graphml b/graph/incidents_graphml/b/b5a230e0-9daa-11ed-a07d-2388b6eb4361.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9444484167373b4a0249ddb27ceb2b16a2435ef1 --- /dev/null +++ b/graph/incidents_graphml/b/b5a230e0-9daa-11ed-a07d-2388b6eb4361.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.107.156 + 192.168.107.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.104 + 100.64.90.104 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1674759203 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5a230e0-9daa-11ed-a07d-2388b6eb4361 + + + INCIDENT_LINK + 1674759203 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5a230e0-9daa-11ed-a07d-2388b6eb4361 + + + diff --git a/graph/incidents_graphml/b/b5a6d470-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b5a6d470-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..123d1a213ac93f5bf6c5ab02b8efb20679d6ecb6 --- /dev/null +++ b/graph/incidents_graphml/b/b5a6d470-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.98 + 100.64.54.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694431871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5a6d470-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/b/b5af3890-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b5af3890-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2bf1149f27c954637da1011777a741b5e01b0037 --- /dev/null +++ b/graph/incidents_graphml/b/b5af3890-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.86 + 100.64.33.86 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758358 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5af3890-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b5b59700-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/b/b5b59700-216e-11ee-9e0b-8dcc0a578b7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd9f3caa6262623678709535755aad9291477a2b --- /dev/null +++ b/graph/incidents_graphml/b/b5b59700-216e-11ee-9e0b-8dcc0a578b7b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.193.138 + 192.168.193.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.79.162 + 100.64.79.162 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.161 + 100.64.77.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689246987 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5b59700-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246987 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5b59700-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246987 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5b59700-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246987 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5b59700-216e-11ee-9e0b-8dcc0a578b7b + + + diff --git a/graph/incidents_graphml/b/b5b72820-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b5b72820-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b8746f205d5e90c5d6db3a3c2f358caf393263d --- /dev/null +++ b/graph/incidents_graphml/b/b5b72820-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.54.98 + 100.64.54.98 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694431871 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b5b72820-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/b/b5bdde90-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b5bdde90-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eac17d257926f3dd64868ce63141fe7e1d5d0721 --- /dev/null +++ b/graph/incidents_graphml/b/b5bdde90-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.86 + 100.64.33.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758358 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b5bdde90-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b5c5f530-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b5c5f530-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27b46126224d0ca8f1a945a490f145c0cbae9832 --- /dev/null +++ b/graph/incidents_graphml/b/b5c5f530-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.125 + 100.64.85.125 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694431872 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5c5f530-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/b/b5c81ab0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml b/graph/incidents_graphml/b/b5c81ab0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c07338b365f78badcdfa5ff7969ae2d7b9335a1d --- /dev/null +++ b/graph/incidents_graphml/b/b5c81ab0-3a32-11ee-a0d4-2bfcb77b8e2b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.225 + 100.64.53.225 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691969996 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5c81ab0-3a32-11ee-a0d4-2bfcb77b8e2b + + + diff --git a/graph/incidents_graphml/b/b5d5aca0-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b5d5aca0-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13e761c495a329068f63fd06f5c45047abbe09e2 --- /dev/null +++ b/graph/incidents_graphml/b/b5d5aca0-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.125 + 100.64.85.125 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694431872 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b5d5aca0-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/b/b5d88560-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/b5d88560-fe9d-11ed-b0fc-1f31d51c8878.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29477dbadab1e143d42e6c4bb56c1cf83b2f79ec --- /dev/null +++ b/graph/incidents_graphml/b/b5d88560-fe9d-11ed-b0fc-1f31d51c8878.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685418883 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5d88560-fe9d-11ed-b0fc-1f31d51c8878 + + + diff --git a/graph/incidents_graphml/b/b5df2d10-5308-11ee-b63c-1beb4899e6f1.graphml b/graph/incidents_graphml/b/b5df2d10-5308-11ee-b63c-1beb4899e6f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b05b035ae9adb6ff9b28288c21231d551900108 --- /dev/null +++ b/graph/incidents_graphml/b/b5df2d10-5308-11ee-b63c-1beb4899e6f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1694700737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5df2d10-5308-11ee-b63c-1beb4899e6f1 + + + diff --git a/graph/incidents_graphml/b/b5e399e0-5308-11ee-b63c-1beb4899e6f1.graphml b/graph/incidents_graphml/b/b5e399e0-5308-11ee-b63c-1beb4899e6f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c29fce231eae8f5d4cae9ce0654a02ccd1a5305d --- /dev/null +++ b/graph/incidents_graphml/b/b5e399e0-5308-11ee-b63c-1beb4899e6f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.202 + 100.64.69.202 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1694700737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5e399e0-5308-11ee-b63c-1beb4899e6f1 + + + diff --git a/graph/incidents_graphml/b/b5e7ae70-21b9-11ee-ad82-796ed23e6009.graphml b/graph/incidents_graphml/b/b5e7ae70-21b9-11ee-ad82-796ed23e6009.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb34c8c7ab3a29ee88be919255dba6bcf7171c4a --- /dev/null +++ b/graph/incidents_graphml/b/b5e7ae70-21b9-11ee-ad82-796ed23e6009.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.64 + 100.64.4.64 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689279200 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b5e7ae70-21b9-11ee-ad82-796ed23e6009 + + + diff --git a/graph/incidents_graphml/b/b5f4a740-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b5f4a740-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8424db5a20df398d7332ebc09c57cac81861bbde --- /dev/null +++ b/graph/incidents_graphml/b/b5f4a740-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.170 + 100.64.94.170 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694242893 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b5f4a740-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/b/b5f89900-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b5f89900-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..127c375a86a78ebeb68631d339895920d0bad56c --- /dev/null +++ b/graph/incidents_graphml/b/b5f89900-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.132 + 100.64.15.132 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740022 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b5f89900-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b5fd34e0-39b8-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/b/b5fd34e0-39b8-11ee-84c9-adc60bfa2a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d25c9574663af092c73d699f13a09901583e3eed --- /dev/null +++ b/graph/incidents_graphml/b/b5fd34e0-39b8-11ee-84c9-adc60bfa2a04.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.43.19 + 192.168.43.19 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.30 + USER-0015-2164.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1691917598 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5fd34e0-39b8-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917598 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b5fd34e0-39b8-11ee-84c9-adc60bfa2a04 + + + diff --git a/graph/incidents_graphml/b/b5ff5c40-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b5ff5c40-24c6-11ee-aa36-6b1924b88a3a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..636552c7b090366a1fbfe804d95ed749cae2fa65 --- /dev/null +++ b/graph/incidents_graphml/b/b5ff5c40-24c6-11ee-aa36-6b1924b88a3a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.59 + 100.64.17.59 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689614637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b5ff5c40-24c6-11ee-aa36-6b1924b88a3a + + + diff --git a/graph/incidents_graphml/b/b60a4450-dfa8-11ee-806c-c9cebb5c20a7.graphml b/graph/incidents_graphml/b/b60a4450-dfa8-11ee-806c-c9cebb5c20a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b23a82dcd0dc487adfbc207c9fa5f82d9f13605f --- /dev/null +++ b/graph/incidents_graphml/b/b60a4450-dfa8-11ee-806c-c9cebb5c20a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.5 + 100.64.44.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710162619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b60a4450-dfa8-11ee-806c-c9cebb5c20a7 + + + diff --git a/graph/incidents_graphml/b/b60d31c0-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b60d31c0-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ab0ce7201a04a0af217d61bd6d60e3a01f1d57d --- /dev/null +++ b/graph/incidents_graphml/b/b60d31c0-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.54 + 100.64.12.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028873 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b60d31c0-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b60e9200-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b60e9200-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ebfd4603cc320dbb35bfefb21db695af3a3b53d --- /dev/null +++ b/graph/incidents_graphml/b/b60e9200-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.134 + 100.64.15.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740022 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b60e9200-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b61443d0-24c6-11ee-aa36-6b1924b88a3a.graphml b/graph/incidents_graphml/b/b61443d0-24c6-11ee-aa36-6b1924b88a3a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d5505b9697a27d6a290a2faf63356ae99362454 --- /dev/null +++ b/graph/incidents_graphml/b/b61443d0-24c6-11ee-aa36-6b1924b88a3a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.59 + 100.64.17.59 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689614637 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b61443d0-24c6-11ee-aa36-6b1924b88a3a + + + diff --git a/graph/incidents_graphml/b/b616d760-39b8-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/b/b616d760-39b8-11ee-84c9-adc60bfa2a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8979a92fd7b2457eb6f2a2eab924e8d2f0584029 --- /dev/null +++ b/graph/incidents_graphml/b/b616d760-39b8-11ee-84c9-adc60bfa2a04.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.37.13 + 172.30.37.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.90.116 + 100.64.90.116 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.74 + 100.64.91.74 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.119.136 + 172.29.119.136 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + INCIDENT_LINK + 1691917598 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b616d760-39b8-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917598 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b616d760-39b8-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917598 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b616d760-39b8-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917598 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b616d760-39b8-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917598 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b616d760-39b8-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917598 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b616d760-39b8-11ee-84c9-adc60bfa2a04 + + + diff --git a/graph/incidents_graphml/b/b61cc2d0-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b61cc2d0-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60a4bfc8296cc3e86c3a7664c2972a250c260a9f --- /dev/null +++ b/graph/incidents_graphml/b/b61cc2d0-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.136 + 100.64.15.136 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740022 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b61cc2d0-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b624aa20-dfa8-11ee-806c-c9cebb5c20a7.graphml b/graph/incidents_graphml/b/b624aa20-dfa8-11ee-806c-c9cebb5c20a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d90d776860c61773e2ec8adcf4ce855b8c0c824 --- /dev/null +++ b/graph/incidents_graphml/b/b624aa20-dfa8-11ee-806c-c9cebb5c20a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.5 + 100.64.44.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710162619 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b624aa20-dfa8-11ee-806c-c9cebb5c20a7 + + + diff --git a/graph/incidents_graphml/b/b62c5330-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b62c5330-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b770eff78640c236f1cf61b4d0d796b16484eef --- /dev/null +++ b/graph/incidents_graphml/b/b62c5330-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.136 + 100.64.15.136 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740022 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b62c5330-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b62d1e80-39b8-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/b/b62d1e80-39b8-11ee-84c9-adc60bfa2a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b43744d88e0bac31e1302c63d24cc2491214d627 --- /dev/null +++ b/graph/incidents_graphml/b/b62d1e80-39b8-11ee-84c9-adc60bfa2a04.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.162.137 + 172.21.162.137 + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.97.32 + 100.64.97.32 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691917598 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b62d1e80-39b8-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917598 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b62d1e80-39b8-11ee-84c9-adc60bfa2a04 + + + diff --git a/graph/incidents_graphml/b/b638fe30-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b638fe30-39e0-11ee-b92b-37d2cd449a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56f9e5b00f58c12523f5197f522444355d985200 --- /dev/null +++ b/graph/incidents_graphml/b/b638fe30-39e0-11ee-b92b-37d2cd449a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.199 + 100.64.45.199 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691934778 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b638fe30-39e0-11ee-b92b-37d2cd449a32 + + + diff --git a/graph/incidents_graphml/b/b6394640-317b-11ef-a44c-8dd6e254532a.graphml b/graph/incidents_graphml/b/b6394640-317b-11ef-a44c-8dd6e254532a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4314bef665799ea00c98c16368ebff7413dbcf05 --- /dev/null +++ b/graph/incidents_graphml/b/b6394640-317b-11ef-a44c-8dd6e254532a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.242 + 100.64.86.242 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719159288 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6394640-317b-11ef-a44c-8dd6e254532a + + + diff --git a/graph/incidents_graphml/b/b63a62d0-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b63a62d0-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c66d699d30fde7330399d45dedad3803146540e --- /dev/null +++ b/graph/incidents_graphml/b/b63a62d0-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.172 + 100.64.94.172 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694242894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b63a62d0-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/b/b63aa8e0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b63aa8e0-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cc968abf58696356f0f6bd160751e0d777dbac6 --- /dev/null +++ b/graph/incidents_graphml/b/b63aa8e0-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.167 + 100.64.53.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b63aa8e0-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/b6481660-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b6481660-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4636d1b8202a558f1dc265b1f723ee8313010353 --- /dev/null +++ b/graph/incidents_graphml/b/b6481660-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.167 + 100.64.53.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854532 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6481660-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/b64c3d20-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b64c3d20-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99e638ce5da5a29ee5f50fa8e36b940fcbb98160 --- /dev/null +++ b/graph/incidents_graphml/b/b64c3d20-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.172 + 100.64.94.172 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694242894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b64c3d20-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/b/b6505740-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b6505740-75ab-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da748f166335c43ff870806651961197635320e2 --- /dev/null +++ b/graph/incidents_graphml/b/b6505740-75ab-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.13 + 100.64.33.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698509085 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6505740-75ab-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/b/b6539620-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/b/b6539620-3150-11ee-9a81-45e5b946e7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3583f724813c18af627982643d822f3bacd9a04e --- /dev/null +++ b/graph/incidents_graphml/b/b6539620-3150-11ee-9a81-45e5b946e7a5.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.88 + 100.64.9.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.89 + 100.64.9.89 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.90 + 100.64.9.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.91 + 100.64.9.91 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.92 + 100.64.9.92 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.93 + 100.64.9.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.94 + 100.64.9.94 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.95 + 100.64.9.95 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.96 + 100.64.9.96 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.97 + 100.64.9.97 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.98 + 100.64.9.98 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.99 + 100.64.9.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.101 + 100.64.9.101 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.102 + 100.64.9.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993322 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6539620-3150-11ee-9a81-45e5b946e7a5 + + + diff --git a/graph/incidents_graphml/b/b659aaa0-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b659aaa0-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d527416e3f418801a8542d0b3e748fa5d9ea702 --- /dev/null +++ b/graph/incidents_graphml/b/b659aaa0-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.173 + 100.64.94.173 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694242894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b659aaa0-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/b/b65f9980-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b65f9980-75ab-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63a08d05a6a107cb7b18ca7c59e0f93784b71b42 --- /dev/null +++ b/graph/incidents_graphml/b/b65f9980-75ab-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.13 + 100.64.33.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698509085 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b65f9980-75ab-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/b/b666c800-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b666c800-a1f6-11ee-8be4-0756a5149684.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d7dd8419b2912e8a4888ec3730a64eda4eff629 --- /dev/null +++ b/graph/incidents_graphml/b/b666c800-a1f6-11ee-8be4-0756a5149684.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.131 + 100.64.62.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379149 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b666c800-a1f6-11ee-8be4-0756a5149684 + + + diff --git a/graph/incidents_graphml/b/b666ec00-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b666ec00-39e0-11ee-b92b-37d2cd449a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81829f6b02b6ffaf8905530fac8a194046ffddca --- /dev/null +++ b/graph/incidents_graphml/b/b666ec00-39e0-11ee-b92b-37d2cd449a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.201 + 100.64.45.201 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691934779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b666ec00-39e0-11ee-b92b-37d2cd449a32 + + + diff --git a/graph/incidents_graphml/b/b6672bb0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/b6672bb0-2ebf-11ee-9131-1117bdeaaaa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..330ed87ca015041c7dad492fa6e7af188a45a259 --- /dev/null +++ b/graph/incidents_graphml/b/b6672bb0-2ebf-11ee-9131-1117bdeaaaa3.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.66.225 + 100.64.66.225 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.111 + 100.64.72.111 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.112 + 100.64.72.112 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690711143 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6672bb0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711143 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6672bb0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711143 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6672bb0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711143 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6672bb0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711143 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6672bb0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711143 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6672bb0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711143 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6672bb0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711143 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6672bb0-2ebf-11ee-9131-1117bdeaaaa3 + + + diff --git a/graph/incidents_graphml/b/b6693b00-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b6693b00-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5c7b4691e4e33a354628415500ffee0bc8f2cfb --- /dev/null +++ b/graph/incidents_graphml/b/b6693b00-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.173 + 100.64.94.173 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694242894 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6693b00-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/b/b6763150-a1f6-11ee-8be4-0756a5149684.graphml b/graph/incidents_graphml/b/b6763150-a1f6-11ee-8be4-0756a5149684.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed67106880661edc9e4a79093917bf1bcb4d9b3e --- /dev/null +++ b/graph/incidents_graphml/b/b6763150-a1f6-11ee-8be4-0756a5149684.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.131 + 100.64.62.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379149 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6763150-a1f6-11ee-8be4-0756a5149684 + + + diff --git a/graph/incidents_graphml/b/b6765a60-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b6765a60-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2116acbc0a8a16c4fee0048ca54399f44dc817df --- /dev/null +++ b/graph/incidents_graphml/b/b6765a60-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.176 + 100.64.94.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1694242894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6765a60-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/b/b68611d0-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/b/b68611d0-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2413e7130c096ef095a430ffc01ea6825d50fa97 --- /dev/null +++ b/graph/incidents_graphml/b/b68611d0-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.176 + 100.64.94.176 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694242894 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b68611d0-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/b/b689d740-317b-11ef-a44c-8dd6e254532a.graphml b/graph/incidents_graphml/b/b689d740-317b-11ef-a44c-8dd6e254532a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c7dfaa1f6ea05a7dd0abdcfb30beb740fa2aee5 --- /dev/null +++ b/graph/incidents_graphml/b/b689d740-317b-11ef-a44c-8dd6e254532a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.244 + USER-0015-1996.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719159288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b689d740-317b-11ef-a44c-8dd6e254532a + + + diff --git a/graph/incidents_graphml/b/b68b6810-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b68b6810-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..227ba818e0d8a8bf285dc423cf75789d1f724cd0 --- /dev/null +++ b/graph/incidents_graphml/b/b68b6810-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,641 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.127 + 100.64.85.127 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.128 + 100.64.85.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.129 + 100.64.85.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.130 + 100.64.85.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.69 + 100.64.4.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.131 + 100.64.85.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.132 + 100.64.85.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.149 + 100.64.3.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.133 + 100.64.85.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.134 + 100.64.85.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.135 + 100.64.85.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.136 + 100.64.85.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.137 + HOST-17035 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.30 + 100.64.18.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.23.231 + 100.64.23.231 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.209 + 100.64.18.209 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.138 + 100.64.85.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.139 + 100.64.85.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68b6810-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/b/b68c9c70-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b68c9c70-39e0-11ee-b92b-37d2cd449a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef66cf8f13ef08d521181ee3c5f6821ec00ad551 --- /dev/null +++ b/graph/incidents_graphml/b/b68c9c70-39e0-11ee-b92b-37d2cd449a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.201 + 100.64.45.201 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691934779 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b68c9c70-39e0-11ee-b92b-37d2cd449a32 + + + diff --git a/graph/incidents_graphml/b/b68ebf50-8ce2-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/b/b68ebf50-8ce2-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..374a8666c53ea6e1d472891711de971d5966129d --- /dev/null +++ b/graph/incidents_graphml/b/b68ebf50-8ce2-11ee-b145-63bb68632209.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.76 + 100.64.59.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701061584 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b68ebf50-8ce2-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/b/b691c380-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b691c380-de41-11ed-8036-d144f5e7f2f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..400e7458f03b04ca3bdf7690e8cac0cba2fb8849 --- /dev/null +++ b/graph/incidents_graphml/b/b691c380-de41-11ed-8036-d144f5e7f2f2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.107 + 100.64.78.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.78.108 + 100.64.78.108 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1681860933 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b691c380-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b691c380-de41-11ed-8036-d144f5e7f2f2 + + + diff --git a/graph/incidents_graphml/b/b6934a20-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b6934a20-de41-11ed-8036-d144f5e7f2f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae045a070eee7313b626a672f1d75668a1a0d1ef --- /dev/null +++ b/graph/incidents_graphml/b/b6934a20-de41-11ed-8036-d144f5e7f2f2.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.109 + 100.64.78.109 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.180 + 100.64.71.180 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.78.110 + 100.64.78.110 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.39.105 + 100.64.39.105 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.78.111 + 100.64.78.111 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.112 + 100.64.78.112 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.40 + 100.64.73.40 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.78.113 + 100.64.78.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.228 + 100.64.71.228 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6934a20-de41-11ed-8036-d144f5e7f2f2 + + + diff --git a/graph/incidents_graphml/b/b6994520-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b6994520-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68c98f7fd19bdc9d76cd84d94525ea0aa679a8c0 --- /dev/null +++ b/graph/incidents_graphml/b/b6994520-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6994520-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b69971d0-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b69971d0-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3998c82175c7d15bbe609f727c2cf81e925a74b4 --- /dev/null +++ b/graph/incidents_graphml/b/b69971d0-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.127 + 100.64.85.127 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.156 + 100.64.85.156 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 100.64.85.157 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.5.184 + 100.64.5.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.40 + 100.64.11.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.158 + 100.64.85.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.206 + 100.64.58.206 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.159 + 100.64.85.159 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.161 + 100.64.20.161 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.160 + 100.64.85.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.161 + 100.64.85.161 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.162 + 100.64.85.162 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.121 + 100.64.43.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.163 + 100.64.85.163 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.119 + 100.64.8.119 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.184 + 100.64.41.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.215 + USER-0015-1236.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.164 + 100.64.85.164 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.165 + 100.64.85.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.243 + 100.64.13.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.166 + 100.64.85.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + INCIDENT_LINK + 1694431873 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b69971d0-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/b/b69dda80-8ce2-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/b/b69dda80-8ce2-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6df9d13eacc11de3536e438e634d03ba13c4c57d --- /dev/null +++ b/graph/incidents_graphml/b/b69dda80-8ce2-11ee-b145-63bb68632209.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.76 + 100.64.59.76 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701061585 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b69dda80-8ce2-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/b/b6a07660-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b6a07660-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d53064a4806b62a66bcdd13554ff9bd9a3773f65 --- /dev/null +++ b/graph/incidents_graphml/b/b6a07660-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.204 + 100.64.36.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6a07660-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b6a0c0f0-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/b6a0c0f0-95ae-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e4636da30e553bd7ca0e62c8533fbb6da319fd8 --- /dev/null +++ b/graph/incidents_graphml/b/b6a0c0f0-95ae-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.234 + 100.64.75.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1673881313 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6a0c0f0-95ae-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673881313 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6a0c0f0-95ae-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/b/b6a487f0-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/b6a487f0-fe9d-11ed-b0fc-1f31d51c8878.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2c7f15d776c3f76456388be5833f1ea942ecbf1 --- /dev/null +++ b/graph/incidents_graphml/b/b6a487f0-fe9d-11ed-b0fc-1f31d51c8878.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685418884 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6a487f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418884 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6a487f0-fe9d-11ed-b0fc-1f31d51c8878 + + + diff --git a/graph/incidents_graphml/b/b6a7aa10-a060-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/b/b6a7aa10-a060-11ee-9181-41cbe26a7b16.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38d7a69919baa0197a2f36978d599fca5fc0ef52 --- /dev/null +++ b/graph/incidents_graphml/b/b6a7aa10-a060-11ee-9181-41cbe26a7b16.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.230 + 100.64.14.230 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1703204773 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6a7aa10-a060-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703204773 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6a7aa10-a060-11ee-9181-41cbe26a7b16 + + + diff --git a/graph/incidents_graphml/b/b6ab4680-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b6ab4680-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5714a4779b3bc6cb0526d31a4f3849067515161 --- /dev/null +++ b/graph/incidents_graphml/b/b6ab4680-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b6ab4680-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b6afb8a0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b6afb8a0-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c69b67cc8d604731e931b0b4b0e0cf14f2cd08ec --- /dev/null +++ b/graph/incidents_graphml/b/b6afb8a0-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.204 + 100.64.36.204 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758360 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6afb8a0-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b6afd5d0-317b-11ef-a44c-8dd6e254532a.graphml b/graph/incidents_graphml/b/b6afd5d0-317b-11ef-a44c-8dd6e254532a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09bcfe85544e20ee923080825d59d33faa645a7f --- /dev/null +++ b/graph/incidents_graphml/b/b6afd5d0-317b-11ef-a44c-8dd6e254532a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.247 + USER-0015-1997.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719159288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6afd5d0-317b-11ef-a44c-8dd6e254532a + + + diff --git a/graph/incidents_graphml/b/b6b02930-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b6b02930-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..136d8b47639cefc28144cad03f5a42e7eeb98c67 --- /dev/null +++ b/graph/incidents_graphml/b/b6b02930-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.138 + 100.64.15.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740023 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6b02930-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b6b2b430-cff7-11ed-b87d-e343a0a76f13.graphml b/graph/incidents_graphml/b/b6b2b430-cff7-11ed-b87d-e343a0a76f13.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f0e85643da0bd97bd991e090c0fc0857e886262 --- /dev/null +++ b/graph/incidents_graphml/b/b6b2b430-cff7-11ed-b87d-e343a0a76f13.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.255 + 100.64.68.255 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1680289834 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6b2b430-cff7-11ed-b87d-e343a0a76f13 + + + diff --git a/graph/incidents_graphml/b/b6b3b090-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/b/b6b3b090-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..759d0cb62a8c5f8e5d3ec1320cf2ce80e44f6232 --- /dev/null +++ b/graph/incidents_graphml/b/b6b3b090-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.136 + 100.64.85.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694431873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6b3b090-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/b/b6bef640-80dd-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/b/b6bef640-80dd-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88fc6bcf5b740ff92a267a60a89415ea4c3bbcc4 --- /dev/null +++ b/graph/incidents_graphml/b/b6bef640-80dd-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.138 + 100.64.15.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699740023 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6bef640-80dd-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/b/b6bfe540-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b6bfe540-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..834a22fe6846aab1eb25f3295b06e9f1e536d24c --- /dev/null +++ b/graph/incidents_graphml/b/b6bfe540-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.184 + 100.64.17.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6bfe540-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b6c0a340-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b6c0a340-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7440411057c33bc883a434b531c4831ff915b94c --- /dev/null +++ b/graph/incidents_graphml/b/b6c0a340-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.189 + 100.64.12.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028874 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6c0a340-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b6cfc3c0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b6cfc3c0-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d9a08a50258e8b991b87a9dc9917bf35fe25035 --- /dev/null +++ b/graph/incidents_graphml/b/b6cfc3c0-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.184 + 100.64.17.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758360 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b6cfc3c0-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b6d5be30-435f-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/b/b6d5be30-435f-11ef-9e66-fd84d5bf3736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1aaa88066ceaa3367129fb197d49fc7576f082a0 --- /dev/null +++ b/graph/incidents_graphml/b/b6d5be30-435f-11ef-9e66-fd84d5bf3736.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.241 + 100.64.5.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.81 + 100.64.28.81 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.82 + 100.64.28.82 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.83 + 100.64.28.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721126384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6d5be30-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6d5be30-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6d5be30-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6d5be30-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6d5be30-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6d5be30-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6d5be30-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6d5be30-435f-11ef-9e66-fd84d5bf3736 + + + diff --git a/graph/incidents_graphml/b/b6efaed0-435f-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/b/b6efaed0-435f-11ef-9e66-fd84d5bf3736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37f23c945d1badbbcc70c72123ad8f85f07022d7 --- /dev/null +++ b/graph/incidents_graphml/b/b6efaed0-435f-11ef-9e66-fd84d5bf3736.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.87 + 100.64.28.87 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.200 + 100.64.2.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.88 + 100.64.28.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721126384 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6efaed0-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6efaed0-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6efaed0-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6efaed0-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6efaed0-435f-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126384 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6efaed0-435f-11ef-9e66-fd84d5bf3736 + + + diff --git a/graph/incidents_graphml/b/b6efec10-317b-11ef-a44c-8dd6e254532a.graphml b/graph/incidents_graphml/b/b6efec10-317b-11ef-a44c-8dd6e254532a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..445e1c3a03ca5dcb7886cd2d7dde86ac826ac3d8 --- /dev/null +++ b/graph/incidents_graphml/b/b6efec10-317b-11ef-a44c-8dd6e254532a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.246 + USER-0015-1998.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719159289 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6efec10-317b-11ef-a44c-8dd6e254532a + + + diff --git a/graph/incidents_graphml/b/b6eff220-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b6eff220-39e0-11ee-b92b-37d2cd449a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9899e7fc256fb244bb261112aac3afcec250d3b8 --- /dev/null +++ b/graph/incidents_graphml/b/b6eff220-39e0-11ee-b92b-37d2cd449a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.203 + 100.64.45.203 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691934780 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6eff220-39e0-11ee-b92b-37d2cd449a32 + + + diff --git a/graph/incidents_graphml/b/b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/b/b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a83854eb981d2e7570a05a0444d951200f0fb586 --- /dev/null +++ b/graph/incidents_graphml/b/b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.11.138 + 172.22.11.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.92.71 + 100.64.92.71 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.175 + 100.64.86.175 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.154 + 100.64.95.154 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.1.246 + 100.64.1.246 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.34 + 100.64.89.34 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6fd51e0-3552-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/b/b6ff6ee0-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/b/b6ff6ee0-9773-11ed-8e25-218966643970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bf9cfb125677ca835eeafe9e26e23e554613281 --- /dev/null +++ b/graph/incidents_graphml/b/b6ff6ee0-9773-11ed-8e25-218966643970.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.184 + 100.64.34.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.161 + 100.64.72.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1674075876 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6ff6ee0-9773-11ed-8e25-218966643970 + + + INCIDENT_LINK + 1674075876 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b6ff6ee0-9773-11ed-8e25-218966643970 + + + diff --git a/graph/incidents_graphml/b/b6ffb1f0-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b6ffb1f0-56c5-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c42f3db6bb9f5b16be0c5a8264d3aad08d7196d1 --- /dev/null +++ b/graph/incidents_graphml/b/b6ffb1f0-56c5-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.79 + 100.64.27.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.30 + 100.64.74.30 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666964269 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b6ffb1f0-56c5-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/b/b70332e0-029b-11ed-9608-918c8d74993e.graphml b/graph/incidents_graphml/b/b70332e0-029b-11ed-9608-918c8d74993e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75c25f29e08579eb8066644ce1c843174fbaedf3 --- /dev/null +++ b/graph/incidents_graphml/b/b70332e0-029b-11ed-9608-918c8d74993e.graphml @@ -0,0 +1,99 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.68 + 100.64.80.68 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.228 + 100.64.71.228 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657710333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70332e0-029b-11ed-9608-918c8d74993e + + + INCIDENT_LINK + 1657710333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70332e0-029b-11ed-9608-918c8d74993e + + + INCIDENT_LINK + 1657710333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70332e0-029b-11ed-9608-918c8d74993e + + + diff --git a/graph/incidents_graphml/b/b70460e0-076a-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/b/b70460e0-076a-11ef-93a8-d78cfa287885.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1de9fdbdd93d22f1e1cbe921a6b2d0653c437dd --- /dev/null +++ b/graph/incidents_graphml/b/b70460e0-076a-11ef-93a8-d78cfa287885.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.94.5 + 100.64.94.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714534039 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b70460e0-076a-11ef-93a8-d78cfa287885 + + + diff --git a/graph/incidents_graphml/b/b70e2810-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/b/b70e2810-182c-11ee-b591-f5bec484f8bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f645cdc3dffcc2c343f68fda85f9018e24dc1a0 --- /dev/null +++ b/graph/incidents_graphml/b/b70e2810-182c-11ee-b591-f5bec484f8bc.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.24.137 + USER-0015-1650.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.73 + 100.64.73.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b70e2810-182c-11ee-b591-f5bec484f8bc + + + diff --git a/graph/incidents_graphml/b/b7157650-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b7157650-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f81c21473174890ad32235039099afcb42b019b5 --- /dev/null +++ b/graph/incidents_graphml/b/b7157650-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.239 + 100.64.46.239 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915979 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7157650-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b721fba0-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b721fba0-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9d51fb854d27e6b16aeba1a240a96e51279f508 --- /dev/null +++ b/graph/incidents_graphml/b/b721fba0-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.169 + 100.64.53.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b721fba0-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/b72b2130-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b72b2130-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb35808e13f98deee6a6f367dc8027f2ec497f05 --- /dev/null +++ b/graph/incidents_graphml/b/b72b2130-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.144 + 100.64.12.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915979 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b72b2130-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b72c6b00-503e-11ee-b697-c3310c70b120.graphml b/graph/incidents_graphml/b/b72c6b00-503e-11ee-b697-c3310c70b120.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8f972687a14256ac0bee4c0223ca22c77679677 --- /dev/null +++ b/graph/incidents_graphml/b/b72c6b00-503e-11ee-b697-c3310c70b120.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.100 + 100.64.21.100 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.16.182 + 100.64.16.182 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.65.26 + 100.64.65.26 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1694394078 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b72c6b00-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394078 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b72c6b00-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394078 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b72c6b00-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394078 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b72c6b00-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394078 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b72c6b00-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394078 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b72c6b00-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394078 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b72c6b00-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394078 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b72c6b00-503e-11ee-b697-c3310c70b120 + + + diff --git a/graph/incidents_graphml/b/b7300560-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b7300560-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61c2b66b0638f99885d2b37f07eba060b85d9f5a --- /dev/null +++ b/graph/incidents_graphml/b/b7300560-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.169 + 100.64.53.169 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854533 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7300560-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/b7310710-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b7310710-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8674fe30ae399346ca3105f2737fabf1183906bd --- /dev/null +++ b/graph/incidents_graphml/b/b7310710-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.18 + 100.64.43.18 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909045 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7310710-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b7339da0-adc1-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/b/b7339da0-adc1-11ed-a9cd-bdbbd3b810c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe567722a982c900fbab85b54eeea4afc835e3d7 --- /dev/null +++ b/graph/incidents_graphml/b/b7339da0-adc1-11ed-a9cd-bdbbd3b810c7.graphml @@ -0,0 +1,141 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.230.142.18 + 10.230.142.18 + ["Exploiting Host"] + 0.7890625 + ["Precinct","AWS VPC Security","Windows Logs"] + + + HOST + 10.211.95.143 + 10.211.95.143 + ["Exploiting Target"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 10.175.170.193 + 10.175.170.193 + ["Exploiting Target"] + 0.7890625 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1676528303 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7339da0-adc1-11ed-a9cd-bdbbd3b810c7 + + + INCIDENT_LINK + 1676528303 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7339da0-adc1-11ed-a9cd-bdbbd3b810c7 + + + INCIDENT_LINK + 1676528303 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7339da0-adc1-11ed-a9cd-bdbbd3b810c7 + + + INCIDENT_LINK + 1676528303 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7339da0-adc1-11ed-a9cd-bdbbd3b810c7 + + + INCIDENT_LINK + 1676528303 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7339da0-adc1-11ed-a9cd-bdbbd3b810c7 + + + INCIDENT_LINK + 1676528303 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7339da0-adc1-11ed-a9cd-bdbbd3b810c7 + + + diff --git a/graph/incidents_graphml/b/b73d7820-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/b/b73d7820-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..626b8e27604c3085e3f115e7a53aa5c733c24767 --- /dev/null +++ b/graph/incidents_graphml/b/b73d7820-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.72 + 100.64.22.72 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b73d7820-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/b/b7416c00-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b7416c00-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29bd26f2718cccfacfaee93f3800a55350034e3d --- /dev/null +++ b/graph/incidents_graphml/b/b7416c00-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.40 + 100.64.37.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028875 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7416c00-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b741cff0-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b741cff0-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f14fd1f6ffe759807b15463c0895429f69726ca --- /dev/null +++ b/graph/incidents_graphml/b/b741cff0-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.20 + 100.64.43.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b741cff0-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b742f120-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/b742f120-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87fb432163a3f63f11ed51fc7ad650065b502c1c --- /dev/null +++ b/graph/incidents_graphml/b/b742f120-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.173 + 100.64.53.173 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854534 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b742f120-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/b7470da0-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b7470da0-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1be0fae7e1c71b8f0fded2b2f2421ae11f6e72b --- /dev/null +++ b/graph/incidents_graphml/b/b7470da0-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.144 + 100.64.12.144 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915979 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7470da0-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b747cc80-a33a-11ed-a505-7f4e35fde98f.graphml b/graph/incidents_graphml/b/b747cc80-a33a-11ed-a505-7f4e35fde98f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17dbcd95496ab481042202e1496ad47296001dff --- /dev/null +++ b/graph/incidents_graphml/b/b747cc80-a33a-11ed-a505-7f4e35fde98f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.198.2382 + 192.168.198.2382 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki"] + + + HOST + 100.64.73.198 + 100.64.73.198 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki"] + + + INCIDENT_LINK + 1675370809 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b747cc80-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370809 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b747cc80-a33a-11ed-a505-7f4e35fde98f + + + diff --git a/graph/incidents_graphml/b/b74a8c70-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/b74a8c70-ebef-11ec-9679-75d3d6184114.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a53ad915c02f9bfe4896548ab90ff302c5ad9531 --- /dev/null +++ b/graph/incidents_graphml/b/b74a8c70-ebef-11ec-9679-75d3d6184114.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.18 + 100.64.5.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655217534 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b74a8c70-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217534 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b74a8c70-ebef-11ec-9679-75d3d6184114 + + + diff --git a/graph/incidents_graphml/b/b74b33c0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/b/b74b33c0-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..460ebd3bc7b90fe135e353fbfd235f66443b54aa --- /dev/null +++ b/graph/incidents_graphml/b/b74b33c0-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.22.72 + 100.64.22.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700587 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b74b33c0-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/b/b74e3a70-36e6-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/b/b74e3a70-36e6-11ef-997a-f7dc07e23a4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3cb2878e1864d6fc60bf2c0e9da790a2a13f35e --- /dev/null +++ b/graph/incidents_graphml/b/b74e3a70-36e6-11ef-997a-f7dc07e23a4a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.22 + 100.64.6.22 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719755001 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b74e3a70-36e6-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755001 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b74e3a70-36e6-11ef-997a-f7dc07e23a4a + + + diff --git a/graph/incidents_graphml/b/b74f0210-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/b74f0210-39e0-11ee-b92b-37d2cd449a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b33c2a728e0ff1d99eea51701abecf87dacbe67 --- /dev/null +++ b/graph/incidents_graphml/b/b74f0210-39e0-11ee-b92b-37d2cd449a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.10 + 100.64.37.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691934780 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b74f0210-39e0-11ee-b92b-37d2cd449a32 + + + diff --git a/graph/incidents_graphml/b/b751fc90-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b751fc90-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2453ffa44b0d63373439f940450afc5d66299189 --- /dev/null +++ b/graph/incidents_graphml/b/b751fc90-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.20 + 100.64.43.20 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909045 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b751fc90-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b752f830-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b752f830-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04a015e73c16fa332eb74d4a281fcb65eba2e293 --- /dev/null +++ b/graph/incidents_graphml/b/b752f830-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.40 + 100.64.37.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028875 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b752f830-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b7675120-503e-11ee-b697-c3310c70b120.graphml b/graph/incidents_graphml/b/b7675120-503e-11ee-b697-c3310c70b120.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c83ae918f6826bd010eecdbf2c1f2aec49e33e4 --- /dev/null +++ b/graph/incidents_graphml/b/b7675120-503e-11ee-b697-c3310c70b120.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.19.45 + 100.64.19.45 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694394079 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7675120-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394079 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7675120-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394079 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7675120-503e-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394079 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7675120-503e-11ee-b697-c3310c70b120 + + + diff --git a/graph/incidents_graphml/b/b7679b60-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/b/b7679b60-0cf7-11ee-aa7f-c3325e1e3407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9214fa739e89671b16e7e61c561bcdf7b0acaeee --- /dev/null +++ b/graph/incidents_graphml/b/b7679b60-0cf7-11ee-aa7f-c3325e1e3407.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.66 + 100.64.75.66 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 192.168.87.65 + 192.168.87.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686996856 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7679b60-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996856 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7679b60-0cf7-11ee-aa7f-c3325e1e3407 + + + diff --git a/graph/incidents_graphml/b/b76ee9f0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b76ee9f0-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f35ad7b45d7644de126b7bcf6e07caa3730e532e --- /dev/null +++ b/graph/incidents_graphml/b/b76ee9f0-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.128 + 100.64.3.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758361 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b76ee9f0-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b77cf3b0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b77cf3b0-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9b5a4add3bc14880923b22c528ea0029c6c596c --- /dev/null +++ b/graph/incidents_graphml/b/b77cf3b0-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.128 + 100.64.3.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758361 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b77cf3b0-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b78c0ee0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b78c0ee0-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77f07dfe7e093938e8631b64e54e4162c151ac15 --- /dev/null +++ b/graph/incidents_graphml/b/b78c0ee0-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.110 + USER-0015-1308.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758361 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b78c0ee0-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b79ab4e0-8a20-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/b/b79ab4e0-8a20-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..191f5f21c22f1c45e6879200bbce51fc2231452e --- /dev/null +++ b/graph/incidents_graphml/b/b79ab4e0-8a20-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.208 + 100.64.36.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700758361 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b79ab4e0-8a20-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/b/b7a470e0-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/b/b7a470e0-1c9b-11ee-baac-abb351177483.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec9d8c83ade72c46161b77208ec8c4964887b4ca --- /dev/null +++ b/graph/incidents_graphml/b/b7a470e0-1c9b-11ee-baac-abb351177483.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.72 + 100.64.35.72 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688716562 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7a470e0-1c9b-11ee-baac-abb351177483 + + + diff --git a/graph/incidents_graphml/b/b7a68530-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b7a68530-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f3572ae097affcd6fe3cf79df51c539aa25a000 --- /dev/null +++ b/graph/incidents_graphml/b/b7a68530-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.152 + 100.64.25.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909046 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7a68530-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b7aaa660-70e5-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/b/b7aaa660-70e5-11ee-adf7-3be9df66b766.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0ed5018c8f2d69136ab50aaf6bd30a23113dab6 --- /dev/null +++ b/graph/incidents_graphml/b/b7aaa660-70e5-11ee-adf7-3be9df66b766.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.77 + 100.64.68.77 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + INCIDENT_LINK + 1697984242 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7aaa660-70e5-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984242 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7aaa660-70e5-11ee-adf7-3be9df66b766 + + + diff --git a/graph/incidents_graphml/b/b7b713e0-1291-11ed-83c9-c740e142a095.graphml b/graph/incidents_graphml/b/b7b713e0-1291-11ed-83c9-c740e142a095.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccf9811c5595492873433735e7b357fad477105c --- /dev/null +++ b/graph/incidents_graphml/b/b7b713e0-1291-11ed-83c9-c740e142a095.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.17.250 + 100.64.17.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659465258 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7b713e0-1291-11ed-83c9-c740e142a095 + + + diff --git a/graph/incidents_graphml/b/b7b83870-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b7b83870-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0252de621720ec817bbdd36207a420662758069f --- /dev/null +++ b/graph/incidents_graphml/b/b7b83870-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.68 + 100.64.37.68 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909046 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7b83870-54ed-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694909046 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7b83870-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b7bfc110-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/b/b7bfc110-1c9b-11ee-baac-abb351177483.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bc71f1812cdad00a1b3573bf5171c202a0b6b66 --- /dev/null +++ b/graph/incidents_graphml/b/b7bfc110-1c9b-11ee-baac-abb351177483.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.72 + 100.64.35.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688716562 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7bfc110-1c9b-11ee-baac-abb351177483 + + + diff --git a/graph/incidents_graphml/b/b7c23770-1291-11ed-83c9-c740e142a095.graphml b/graph/incidents_graphml/b/b7c23770-1291-11ed-83c9-c740e142a095.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4199c3f4d24a24241e26bfe512ce26b845b29b2 --- /dev/null +++ b/graph/incidents_graphml/b/b7c23770-1291-11ed-83c9-c740e142a095.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.129 + 100.64.92.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659465258 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7c23770-1291-11ed-83c9-c740e142a095 + + + diff --git a/graph/incidents_graphml/b/b7c69c10-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/b/b7c69c10-65c6-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f161fc98a67178dce9c3f2dd27aba7dfb6ebfab3 --- /dev/null +++ b/graph/incidents_graphml/b/b7c69c10-65c6-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.152 + 100.64.81.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.40 + 100.64.73.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1668613967 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7c69c10-65c6-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668613967 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7c69c10-65c6-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/b/b7c851f0-1291-11ed-83c9-c740e142a095.graphml b/graph/incidents_graphml/b/b7c851f0-1291-11ed-83c9-c740e142a095.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46c35a386ed40342e1abeb402d4abaebfb9a4f18 --- /dev/null +++ b/graph/incidents_graphml/b/b7c851f0-1291-11ed-83c9-c740e142a095.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.129 + 100.64.92.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659465258 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7c851f0-1291-11ed-83c9-c740e142a095 + + + diff --git a/graph/incidents_graphml/b/b7cd52d0-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/b/b7cd52d0-65c6-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4814fb7bc071545808d9a6799698cad75aade9b2 --- /dev/null +++ b/graph/incidents_graphml/b/b7cd52d0-65c6-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.153 + 100.64.81.153 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.200 + 100.64.72.200 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1668613967 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7cd52d0-65c6-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668613967 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7cd52d0-65c6-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/b/b7cdbc40-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b7cdbc40-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1916d7029163f253fdb898bff66853e2f7fb34d5 --- /dev/null +++ b/graph/incidents_graphml/b/b7cdbc40-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.68 + 100.64.37.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909046 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7cdbc40-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/b/b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cc52bf558f65db67951174b8ede5a184dbabe0c --- /dev/null +++ b/graph/incidents_graphml/b/b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.85 + 100.64.78.85 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657069095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7d0a070-fcc6-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/b/b7d6a470-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/b/b7d6a470-1c9b-11ee-baac-abb351177483.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3462bde86fd18e9f13945e86ce324a7fa6abc320 --- /dev/null +++ b/graph/incidents_graphml/b/b7d6a470-1c9b-11ee-baac-abb351177483.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.74 + 100.64.35.74 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688716562 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7d6a470-1c9b-11ee-baac-abb351177483 + + + diff --git a/graph/incidents_graphml/b/b7e5c250-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b7e5c250-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ec3b2aa0bcb94275bc5296bce5490cb2440cb7f --- /dev/null +++ b/graph/incidents_graphml/b/b7e5c250-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7e5c250-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b7ea9960-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/b/b7ea9960-311a-11ee-87a2-613e036775fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60fbe37fd6912689749a395518f0390554a1b78c --- /dev/null +++ b/graph/incidents_graphml/b/b7ea9960-311a-11ee-87a2-613e036775fd.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.50 + 100.64.58.50 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.51 + 100.64.58.51 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.52 + 100.64.58.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690970132 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b7ea9960-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970132 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b7ea9960-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970132 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b7ea9960-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970132 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b7ea9960-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970132 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b7ea9960-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970132 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b7ea9960-311a-11ee-87a2-613e036775fd + + + diff --git a/graph/incidents_graphml/b/b7eaeec0-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b7eaeec0-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c48ffa1e0b99d7c094a444c2823e2e519b197fcf --- /dev/null +++ b/graph/incidents_graphml/b/b7eaeec0-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.120 + 100.64.25.120 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.168 + 100.64.30.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.5 + USER-0015-1363.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.43 + 100.64.4.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915980 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7eaeec0-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915980 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7eaeec0-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915980 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7eaeec0-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915980 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7eaeec0-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915980 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7eaeec0-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915980 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7eaeec0-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915980 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7eaeec0-1553-11ee-a373-07433a95fe5c + + + INCIDENT_LINK + 1687915980 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b7eaeec0-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b7ed87f0-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b7ed87f0-3fb2-11ee-b2f5-ad594961d736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7bdcfc0141509ba9bde1221de7897a5807e49336 --- /dev/null +++ b/graph/incidents_graphml/b/b7ed87f0-3fb2-11ee-b2f5-ad594961d736.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692574731 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7ed87f0-3fb2-11ee-b2f5-ad594961d736 + + + diff --git a/graph/incidents_graphml/b/b7f06450-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b7f06450-892a-11ed-9e45-31aae3dc518d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0eca32e79a6aa69837f87b51331aac538d794e70 --- /dev/null +++ b/graph/incidents_graphml/b/b7f06450-892a-11ed-9e45-31aae3dc518d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.79 + 100.64.91.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1672505208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7f06450-892a-11ed-9e45-31aae3dc518d + + + diff --git a/graph/incidents_graphml/b/b7f465a0-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/b/b7f465a0-1c9b-11ee-baac-abb351177483.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62e7417dc27abcc85518b23e39940a12a5b4e397 --- /dev/null +++ b/graph/incidents_graphml/b/b7f465a0-1c9b-11ee-baac-abb351177483.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.74 + 100.64.35.74 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688716562 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7f465a0-1c9b-11ee-baac-abb351177483 + + + diff --git a/graph/incidents_graphml/b/b7f67ed0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b7f67ed0-892a-11ed-9e45-31aae3dc518d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c6aaf1a11a2426e96140ec58505f9160b8aa199 --- /dev/null +++ b/graph/incidents_graphml/b/b7f67ed0-892a-11ed-9e45-31aae3dc518d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.79 + 100.64.91.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1672505208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7f67ed0-892a-11ed-9e45-31aae3dc518d + + + diff --git a/graph/incidents_graphml/b/b7f8efd0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b7f8efd0-892a-11ed-9e45-31aae3dc518d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21fb89df29bff49e59519aa7012a76f515a06f67 --- /dev/null +++ b/graph/incidents_graphml/b/b7f8efd0-892a-11ed-9e45-31aae3dc518d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.80 + 100.64.91.80 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1672505208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b7f8efd0-892a-11ed-9e45-31aae3dc518d + + + diff --git a/graph/incidents_graphml/b/b7fb6cf0-2fec-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/b/b7fb6cf0-2fec-11ef-bbc8-b57a691da072.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0007a9e1bf4a5271a38b36216984d79821e9bba0 --- /dev/null +++ b/graph/incidents_graphml/b/b7fb6cf0-2fec-11ef-bbc8-b57a691da072.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.859375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.124 + 100.64.3.124 + ["Exploiting Host","Exploiting Target"] + 0.859375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718987921 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7fb6cf0-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987921 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7fb6cf0-2fec-11ef-bbc8-b57a691da072 + + + diff --git a/graph/incidents_graphml/b/b7fd83b0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b7fd83b0-892a-11ed-9e45-31aae3dc518d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d58d7eddab38fdb7ecaa1e190b00cbc6331a97c9 --- /dev/null +++ b/graph/incidents_graphml/b/b7fd83b0-892a-11ed-9e45-31aae3dc518d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.80 + 100.64.91.80 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1672505208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7fd83b0-892a-11ed-9e45-31aae3dc518d + + + diff --git a/graph/incidents_graphml/b/b7fdaac0-cff7-11ed-b87d-e343a0a76f13.graphml b/graph/incidents_graphml/b/b7fdaac0-cff7-11ed-b87d-e343a0a76f13.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d452597a88a8fc18614c4f633e0becaf7536d490 --- /dev/null +++ b/graph/incidents_graphml/b/b7fdaac0-cff7-11ed-b87d-e343a0a76f13.graphml @@ -0,0 +1,99 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.1 + 100.64.69.1 + ["Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.255 + 100.64.68.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1680289836 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7fdaac0-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289836 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7fdaac0-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289836 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7fdaac0-cff7-11ed-b87d-e343a0a76f13 + + + diff --git a/graph/incidents_graphml/b/b7fe7a70-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b7fe7a70-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b99bd45d9679e8a9231555718b34af5e8869e6b3 --- /dev/null +++ b/graph/incidents_graphml/b/b7fe7a70-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028876 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b7fe7a70-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b7fe9ef0-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b7fe9ef0-3fb2-11ee-b2f5-ad594961d736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2abf18c8bf2116b066ba8f59c5d5cb387b5585b --- /dev/null +++ b/graph/incidents_graphml/b/b7fe9ef0-3fb2-11ee-b2f5-ad594961d736.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692574731 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b7fe9ef0-3fb2-11ee-b2f5-ad594961d736 + + + diff --git a/graph/incidents_graphml/b/b800b800-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b800b800-892a-11ed-9e45-31aae3dc518d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2560d6f0b91f0aab9fcb26a25ee4ec3fecf5f56f --- /dev/null +++ b/graph/incidents_graphml/b/b800b800-892a-11ed-9e45-31aae3dc518d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.47 + 100.64.11.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1672505208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b800b800-892a-11ed-9e45-31aae3dc518d + + + diff --git a/graph/incidents_graphml/b/b808bd80-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b808bd80-56c5-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..539e71f9f55fa3f3694f199176fa012e39d5b9f3 --- /dev/null +++ b/graph/incidents_graphml/b/b808bd80-56c5-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.193 + 100.64.75.193 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.72.3 + 100.64.72.3 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666964271 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b808bd80-56c5-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/b/b8091c70-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b8091c70-892a-11ed-9e45-31aae3dc518d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed94be3747089bc3244cc060fe13e863a358219c --- /dev/null +++ b/graph/incidents_graphml/b/b8091c70-892a-11ed-9e45-31aae3dc518d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.11.47 + 100.64.11.47 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1672505208 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8091c70-892a-11ed-9e45-31aae3dc518d + + + diff --git a/graph/incidents_graphml/b/b80a7c00-cff7-11ed-b87d-e343a0a76f13.graphml b/graph/incidents_graphml/b/b80a7c00-cff7-11ed-b87d-e343a0a76f13.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1eaf2252eac55f044b817a38aad5031c6a6e5e77 --- /dev/null +++ b/graph/incidents_graphml/b/b80a7c00-cff7-11ed-b87d-e343a0a76f13.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1680289836 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b80a7c00-cff7-11ed-b87d-e343a0a76f13 + + + diff --git a/graph/incidents_graphml/b/b80f67d0-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b80f67d0-3fb2-11ee-b2f5-ad594961d736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ae916f10f5e434d47d64002441d8dd8029fd3b7 --- /dev/null +++ b/graph/incidents_graphml/b/b80f67d0-3fb2-11ee-b2f5-ad594961d736.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.167 + 100.64.18.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692574732 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b80f67d0-3fb2-11ee-b2f5-ad594961d736 + + + diff --git a/graph/incidents_graphml/b/b80fe220-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b80fe220-6503-11ee-b447-a9f06618d419.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8d3f4cdead05fcd5392c02b8362860e0fc2bde7 --- /dev/null +++ b/graph/incidents_graphml/b/b80fe220-6503-11ee-b447-a9f06618d419.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.254 + 100.64.89.254 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1696677714 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b80fe220-6503-11ee-b447-a9f06618d419 + + + diff --git a/graph/incidents_graphml/b/b8101080-56c5-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/b/b8101080-56c5-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a395c41245f8c17d4dcac69a253cf18d6442c69 --- /dev/null +++ b/graph/incidents_graphml/b/b8101080-56c5-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.194 + 100.64.75.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666964271 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8101080-56c5-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/b/b8131830-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/b8131830-3c0b-11ee-8ad1-f5005abd06b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f3dd7aa79bcbeada3e38468153ecb75e7af9741 --- /dev/null +++ b/graph/incidents_graphml/b/b8131830-3c0b-11ee-8ad1-f5005abd06b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.54 + 100.64.85.54 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692173152 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8131830-3c0b-11ee-8ad1-f5005abd06b8 + + + diff --git a/graph/incidents_graphml/b/b8207ed0-3fb2-11ee-b2f5-ad594961d736.graphml b/graph/incidents_graphml/b/b8207ed0-3fb2-11ee-b2f5-ad594961d736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e911c7d706808a4eca29937aa99928877693cfe6 --- /dev/null +++ b/graph/incidents_graphml/b/b8207ed0-3fb2-11ee-b2f5-ad594961d736.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.167 + 100.64.18.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692574732 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8207ed0-3fb2-11ee-b2f5-ad594961d736 + + + diff --git a/graph/incidents_graphml/b/b820f920-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/b/b820f920-6503-11ee-b447-a9f06618d419.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c54e4c7c4c828ad46ee82993044cba7765db990 --- /dev/null +++ b/graph/incidents_graphml/b/b820f920-6503-11ee-b447-a9f06618d419.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.89.254 + 100.64.89.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696677714 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b820f920-6503-11ee-b447-a9f06618d419 + + + diff --git a/graph/incidents_graphml/b/b8260dd0-1133-11ee-a919-7371bcc8a8e4.graphml b/graph/incidents_graphml/b/b8260dd0-1133-11ee-a919-7371bcc8a8e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca5fd7fd1963dd1fbec8fbcceea57846de07047c --- /dev/null +++ b/graph/incidents_graphml/b/b8260dd0-1133-11ee-a919-7371bcc8a8e4.graphml @@ -0,0 +1,553 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.48 + 100.64.55.48 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.49 + USER-0015-1409.example.internal + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.50 + 100.64.55.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.51 + 100.64.55.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.52 + 100.64.55.52 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.13 + 100.64.36.13 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.53 + USER-0015-1410.example.internal + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.54 + 100.64.55.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.55 + 100.64.55.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.127 + 100.64.18.127 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.56 + 100.64.55.56 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.57 + 100.64.55.57 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8260dd0-1133-11ee-a919-7371bcc8a8e4 + + + diff --git a/graph/incidents_graphml/b/b82693e0-df14-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/b/b82693e0-df14-11ee-9778-4184b1db151c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7710dad5a6bd43548a0fb6c16a248130fb7fd1f7 --- /dev/null +++ b/graph/incidents_graphml/b/b82693e0-df14-11ee-9778-4184b1db151c.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.253 + 100.64.9.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.195 + 100.64.4.195 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.254 + 100.64.9.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.255 + 100.64.9.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.1 + 100.64.10.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.1 + 100.64.10.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.2 + 100.64.10.2 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.3 + 100.64.10.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.4 + 100.64.10.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.5 + 100.64.10.5 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.6 + 100.64.10.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.7 + 100.64.10.7 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.8 + 100.64.10.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.9 + 100.64.10.9 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.10 + 100.64.10.10 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.11 + 100.64.10.11 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.12 + 100.64.10.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099057 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b82693e0-df14-11ee-9778-4184b1db151c + + + diff --git a/graph/incidents_graphml/b/b82a1690-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/b/b82a1690-a113-11ed-b936-1349c6e38dc6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..395e8e5e92b111178990c7329dcb345c17859a19 --- /dev/null +++ b/graph/incidents_graphml/b/b82a1690-a113-11ed-b936-1349c6e38dc6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.134 + 100.64.86.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675134158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b82a1690-a113-11ed-b936-1349c6e38dc6 + + + diff --git a/graph/incidents_graphml/b/b82e8360-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/b/b82e8360-a113-11ed-b936-1349c6e38dc6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0206e2ef353900e6b80f65d4e62fdd392b8cc25e --- /dev/null +++ b/graph/incidents_graphml/b/b82e8360-a113-11ed-b936-1349c6e38dc6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.86.134 + 100.64.86.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675134158 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b82e8360-a113-11ed-b936-1349c6e38dc6 + + + diff --git a/graph/incidents_graphml/b/b8302790-54ed-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/b/b8302790-54ed-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..534affd1525979fe580a42c5285438d8ad7a0e02 --- /dev/null +++ b/graph/incidents_graphml/b/b8302790-54ed-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.125 + 100.64.11.125 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694909047 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8302790-54ed-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/b/b838d280-1133-11ee-a919-7371bcc8a8e4.graphml b/graph/incidents_graphml/b/b838d280-1133-11ee-a919-7371bcc8a8e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..350a404ea44a380edd6e1f41de9327dad2cb9f77 --- /dev/null +++ b/graph/incidents_graphml/b/b838d280-1133-11ee-a919-7371bcc8a8e4.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.67 + 100.64.55.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687462432 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b838d280-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b838d280-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b838d280-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462432 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b838d280-1133-11ee-a919-7371bcc8a8e4 + + + diff --git a/graph/incidents_graphml/b/b8390ab0-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/b/b8390ab0-a113-11ed-b936-1349c6e38dc6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d02d51a4ccc4fd3981bf1e26622fe039d3af7322 --- /dev/null +++ b/graph/incidents_graphml/b/b8390ab0-a113-11ed-b936-1349c6e38dc6.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.136 + 100.64.86.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675134158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b8390ab0-a113-11ed-b936-1349c6e38dc6 + + + INCIDENT_LINK + 1675134158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b8390ab0-a113-11ed-b936-1349c6e38dc6 + + + diff --git a/graph/incidents_graphml/b/b83cdb40-a113-11ed-b936-1349c6e38dc6.graphml b/graph/incidents_graphml/b/b83cdb40-a113-11ed-b936-1349c6e38dc6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eaee0a12f1c23e00ff32d0f540b18af4cdb78be9 --- /dev/null +++ b/graph/incidents_graphml/b/b83cdb40-a113-11ed-b936-1349c6e38dc6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.136 + 100.64.86.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675134158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b83cdb40-a113-11ed-b936-1349c6e38dc6 + + + diff --git a/graph/incidents_graphml/b/b849db10-2fec-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/b/b849db10-2fec-11ef-bbc8-b57a691da072.graphml new file mode 100644 index 0000000000000000000000000000000000000000..016a1bfd437ff5106959262699f504693cf40846 --- /dev/null +++ b/graph/incidents_graphml/b/b849db10-2fec-11ef-bbc8-b57a691da072.graphml @@ -0,0 +1,689 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.245 + USER-0015-2083.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.27 + USER-0015-2084.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.28 + USER-0015-2085.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.29 + 100.64.92.29 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.30 + USER-0015-2086.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.130 + USER-0015-2087.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.31 + 100.64.92.31 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.32 + HOST-18244 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.231 + USER-0015-2075.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.33 + USER-0015-2088.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b849db10-2fec-11ef-bbc8-b57a691da072 + + + diff --git a/graph/incidents_graphml/b/b84f5de0-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/b84f5de0-3c0b-11ee-8ad1-f5005abd06b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e76c5fcfadaf8bd12092e9b3c3bf8861b07e9ec --- /dev/null +++ b/graph/incidents_graphml/b/b84f5de0-3c0b-11ee-8ad1-f5005abd06b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.63 + 100.64.85.63 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692173153 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b84f5de0-3c0b-11ee-8ad1-f5005abd06b8 + + + diff --git a/graph/incidents_graphml/b/b854ad10-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b854ad10-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c6d8c91e5d1af58652791e0fdd124627f6dc65f --- /dev/null +++ b/graph/incidents_graphml/b/b854ad10-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.243 + USER-0015-1364.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b854ad10-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b8693130-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b8693130-634c-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b6f3372e577299416d4fbc82854ad91e3773870 --- /dev/null +++ b/graph/incidents_graphml/b/b8693130-634c-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.54 + 100.64.9.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696489165 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8693130-634c-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/b/b86994a0-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b86994a0-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..080b48ccf232bd6f491b9d334d3e9443dbed2c7f --- /dev/null +++ b/graph/incidents_graphml/b/b86994a0-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.243 + USER-0015-1364.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b86994a0-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b86e06e0-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/b86e06e0-95ae-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cf4bc35e556bf8f7e56c394868746a346a26947 --- /dev/null +++ b/graph/incidents_graphml/b/b86e06e0-95ae-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.235 + 100.64.75.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.226 + 100.64.1.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1673881316 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b86e06e0-95ae-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673881316 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b86e06e0-95ae-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/b/b86fb490-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/b86fb490-95ae-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3b5773340381b369c9a74e4bf688cc3ef10317c --- /dev/null +++ b/graph/incidents_graphml/b/b86fb490-95ae-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.236 + 100.64.75.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.90 + 100.64.71.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1673881316 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b86fb490-95ae-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673881316 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b86fb490-95ae-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/b/b87a60f0-2fec-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/b/b87a60f0-2fec-11ef-bbc8-b57a691da072.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1f19be27dedee6ca11ddcc5eecbab32ccbf78c9 --- /dev/null +++ b/graph/incidents_graphml/b/b87a60f0-2fec-11ef-bbc8-b57a691da072.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.124.214 + USER-0015-2089.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.92.63 + USER-0015-2090.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718987922 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b87a60f0-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b87a60f0-2fec-11ef-bbc8-b57a691da072 + + + diff --git a/graph/incidents_graphml/b/b88185d0-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/b88185d0-ebef-11ec-9679-75d3d6184114.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b92787e7ac28b923c4fb745eb76ee93a41a82e26 --- /dev/null +++ b/graph/incidents_graphml/b/b88185d0-ebef-11ec-9679-75d3d6184114.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.255 + 100.64.79.255 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.181 + 100.64.71.181 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.77 + 100.64.73.77 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.1 + 100.64.80.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655217536 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b88185d0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217536 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b88185d0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217536 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b88185d0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217536 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b88185d0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217536 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b88185d0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217536 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b88185d0-ebef-11ec-9679-75d3d6184114 + + + diff --git a/graph/incidents_graphml/b/b883d360-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b883d360-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09ec0960b9d0a9a568a6777d1744fc3d037301b2 --- /dev/null +++ b/graph/incidents_graphml/b/b883d360-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.245 + 100.64.46.245 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915981 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b883d360-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b8857840-3f5c-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/b/b8857840-3f5c-11ee-a7a8-a9c952ce7042.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81f7990d453142ccf67ba7f110dc13f7485691c3 --- /dev/null +++ b/graph/incidents_graphml/b/b8857840-3f5c-11ee-a7a8-a9c952ce7042.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.22 + 100.64.36.22 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.245 + 100.64.69.245 + ["Exploiting Host","Exploiting Target"] + 0.8515 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.69.246 + 100.64.69.246 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537796 + malicious + 0.8515 + 0.8515 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8857840-3f5c-11ee-a7a8-a9c952ce7042 + + + diff --git a/graph/incidents_graphml/b/b88a41b0-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b88a41b0-75ab-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57377d0f6cf55a3323742ce51eea6d156eb2a39c --- /dev/null +++ b/graph/incidents_graphml/b/b88a41b0-75ab-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.15 + 100.64.33.15 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698509089 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b88a41b0-75ab-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/b/b8964d60-2fec-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/b/b8964d60-2fec-11ef-bbc8-b57a691da072.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7726b00718dafbec4909511e9884eba20d977c6 --- /dev/null +++ b/graph/incidents_graphml/b/b8964d60-2fec-11ef-bbc8-b57a691da072.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.90.197 + USER-0015-2091.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.92.64 + USER-0015-2092.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718987922 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b8964d60-2fec-11ef-bbc8-b57a691da072 + + + INCIDENT_LINK + 1718987922 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b8964d60-2fec-11ef-bbc8-b57a691da072 + + + diff --git a/graph/incidents_graphml/b/b89b3510-0bbc-11ed-b340-87a279bd0bd3.graphml b/graph/incidents_graphml/b/b89b3510-0bbc-11ed-b340-87a279bd0bd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d9f5fb31bdc7e3e3208c0a831a2941f26c50407 --- /dev/null +++ b/graph/incidents_graphml/b/b89b3510-0bbc-11ed-b340-87a279bd0bd3.graphml @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.248 + 100.64.84.248 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1658714069 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b89b3510-0bbc-11ed-b340-87a279bd0bd3 + + + INCIDENT_LINK + 1658714069 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b89b3510-0bbc-11ed-b340-87a279bd0bd3 + + + INCIDENT_LINK + 1658714069 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b89b3510-0bbc-11ed-b340-87a279bd0bd3 + + + INCIDENT_LINK + 1658714069 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b89b3510-0bbc-11ed-b340-87a279bd0bd3 + + + diff --git a/graph/incidents_graphml/b/b89d0660-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b89d0660-75ab-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13bf9632ec621b37449d538cefe776b9aa12e3d1 --- /dev/null +++ b/graph/incidents_graphml/b/b89d0660-75ab-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.17 + 100.64.33.17 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698509089 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b89d0660-75ab-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/b/b8a4a1d0-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b8a4a1d0-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3dc669b2c2db3b924ac6d5c55c2d1dd3807fd3ed --- /dev/null +++ b/graph/incidents_graphml/b/b8a4a1d0-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.245 + 100.64.46.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915982 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8a4a1d0-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b8ac2190-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b8ac2190-75ab-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b808eb31e17e691f4b1bea707af389d9c6f5b6dd --- /dev/null +++ b/graph/incidents_graphml/b/b8ac2190-75ab-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.17 + 100.64.33.17 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698509089 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8ac2190-75ab-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/b/b8ad9420-15a3-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/b/b8ad9420-15a3-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..776edd3869fc709a5388c8a8086a0bf3a9be1175 --- /dev/null +++ b/graph/incidents_graphml/b/b8ad9420-15a3-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.237 + 100.64.73.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.85 + 100.64.73.85 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.45.252 + 100.64.45.252 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687950341 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8ad9420-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950341 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8ad9420-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950341 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8ad9420-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950341 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8ad9420-15a3-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/b/b8b8a4f0-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/b8b8a4f0-a5e0-11ee-af6c-2f69bce079e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..839345044de7d7d8ed7f62227579db029d991a5f --- /dev/null +++ b/graph/incidents_graphml/b/b8b8a4f0-a5e0-11ee-af6c-2f69bce079e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.66 + 100.64.36.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703809508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b8b8a4f0-a5e0-11ee-af6c-2f69bce079e5 + + + diff --git a/graph/incidents_graphml/b/b8bbb1f0-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b8bbb1f0-75ab-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a857651d0e8f65f1241e86505cb872873860ea14 --- /dev/null +++ b/graph/incidents_graphml/b/b8bbb1f0-75ab-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.19 + 100.64.33.19 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698509089 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8bbb1f0-75ab-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/b/b8c06c50-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/b8c06c50-f6a1-11ee-8b23-bde5dce38992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a2286da5bb34518bace585456695e800450fed9 --- /dev/null +++ b/graph/incidents_graphml/b/b8c06c50-f6a1-11ee-8b23-bde5dce38992.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.14 + 100.64.22.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712688494 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8c06c50-f6a1-11ee-8b23-bde5dce38992 + + + diff --git a/graph/incidents_graphml/b/b8c92710-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/b/b8c92710-a0fb-11ee-b868-0b39d8f52622.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57baabfb9c1bde710922077bf7fc75ab3f44cb98 --- /dev/null +++ b/graph/incidents_graphml/b/b8c92710-a0fb-11ee-b868-0b39d8f52622.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.163 + 100.64.14.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703271349 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b8c92710-a0fb-11ee-b868-0b39d8f52622 + + + diff --git a/graph/incidents_graphml/b/b8ccf000-75ab-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/b/b8ccf000-75ab-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..898249f6443356f0c35826556aa118685917cc54 --- /dev/null +++ b/graph/incidents_graphml/b/b8ccf000-75ab-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.113 + 100.64.22.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698509089 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8ccf000-75ab-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/b/b8d1a8f0-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b8d1a8f0-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7724fff496e8ab33bdc67c4d7ba5e466b373662 --- /dev/null +++ b/graph/incidents_graphml/b/b8d1a8f0-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.42 + 100.64.37.42 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b8d1a8f0-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b8d357b0-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/b/b8d357b0-182c-11ee-b591-f5bec484f8bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2eb004574672ded852ce154608d425beb885cf86 --- /dev/null +++ b/graph/incidents_graphml/b/b8d357b0-182c-11ee-b591-f5bec484f8bc.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.74 + 100.64.73.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688229085 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8d357b0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229085 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8d357b0-182c-11ee-b591-f5bec484f8bc + + + diff --git a/graph/incidents_graphml/b/b8d4a240-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/b8d4a240-11c0-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9abbe7293093092956d4723e6f282a947cb186b8 --- /dev/null +++ b/graph/incidents_graphml/b/b8d4a240-11c0-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.6 + 100.64.23.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.2 + 100.64.71.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.227 + 100.64.72.227 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687522992 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8d4a240-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522992 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8d4a240-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522992 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8d4a240-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522992 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b8d4a240-11c0-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/b/b8db7690-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/b/b8db7690-a0fb-11ee-b868-0b39d8f52622.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c3ea8bac840eaba103629af34f05dc6049544e4 --- /dev/null +++ b/graph/incidents_graphml/b/b8db7690-a0fb-11ee-b868-0b39d8f52622.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.163 + 100.64.14.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703271349 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b8db7690-a0fb-11ee-b868-0b39d8f52622 + + + diff --git a/graph/incidents_graphml/b/b909ef70-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/b/b909ef70-de41-11ed-8036-d144f5e7f2f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f193fcc35f000f2649ef61b03228d65106e55f1 --- /dev/null +++ b/graph/incidents_graphml/b/b909ef70-de41-11ed-8036-d144f5e7f2f2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.114 + 100.64.78.114 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.158 + HOST-13815 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + INCIDENT_LINK + 1681860937 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b909ef70-de41-11ed-8036-d144f5e7f2f2 + + + INCIDENT_LINK + 1681860937 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b909ef70-de41-11ed-8036-d144f5e7f2f2 + + + diff --git a/graph/incidents_graphml/b/b914a430-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b914a430-f924-11ed-a4ab-835920bf1a34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed38f66f5325627b0f0303721fce22e95c75eba1 --- /dev/null +++ b/graph/incidents_graphml/b/b914a430-f924-11ed-a4ab-835920bf1a34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.19.8 + 100.64.19.8 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684817163 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b914a430-f924-11ed-a4ab-835920bf1a34 + + + diff --git a/graph/incidents_graphml/b/b91a2f10-a813-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/b/b91a2f10-a813-11ee-99fc-3f84722b2bdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd2c4486cd6e942cb0c77691068bc007d542d1cb --- /dev/null +++ b/graph/incidents_graphml/b/b91a2f10-a813-11ee-99fc-3f84722b2bdf.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.249.158.95 + 10.249.158.95 + ["Exploiting Host"] + 0.4375 + ["Precinct","PAN NGFW","Cisco Network Operating System","Windows Active Directory"] + + + HOST + 100.64.68.254 + 100.64.68.254 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1704051315 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b91a2f10-a813-11ee-99fc-3f84722b2bdf + + + INCIDENT_LINK + 1704051315 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b91a2f10-a813-11ee-99fc-3f84722b2bdf + + + diff --git a/graph/incidents_graphml/b/b9258920-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/b9258920-258f-11ee-aa0d-9950110e3974.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9abfaec09f279c40b4d82cd97761734e70a21d02 --- /dev/null +++ b/graph/incidents_graphml/b/b9258920-258f-11ee-aa0d-9950110e3974.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.37 + 100.64.25.37 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689700971 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9258920-258f-11ee-aa0d-9950110e3974 + + + diff --git a/graph/incidents_graphml/b/b92f0c20-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b92f0c20-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36e8dd84c56c08257263131d18ac96f3e1c6d1f2 --- /dev/null +++ b/graph/incidents_graphml/b/b92f0c20-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.177 + USER-0015-1823.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659674854 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b92f0c20-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b931f250-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b931f250-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..955cd0fe3458aba39defd5dafc5a5fd5382da4d3 --- /dev/null +++ b/graph/incidents_graphml/b/b931f250-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.15 + 100.64.76.15 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659674854 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b931f250-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b9372270-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b9372270-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3ceb94688ee2574fd8bea23fdbd68380712bc89 --- /dev/null +++ b/graph/incidents_graphml/b/b9372270-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.15 + 100.64.76.15 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659674854 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b9372270-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b9396c60-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b9396c60-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96d83ae7af748c5bcbec5ca780f5f67e9baaa90e --- /dev/null +++ b/graph/incidents_graphml/b/b9396c60-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.188 + 100.64.5.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.249 + 100.64.73.249 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.204 + 100.64.76.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659674854 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b9396c60-1479-11ed-8143-57b2da877ba3 + + + INCIDENT_LINK + 1659674854 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b9396c60-1479-11ed-8143-57b2da877ba3 + + + INCIDENT_LINK + 1659674854 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b9396c60-1479-11ed-8143-57b2da877ba3 + + + INCIDENT_LINK + 1659674854 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b9396c60-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b93d15e0-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b93d15e0-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c681b5532d401b9e8c9663df807ffb04de76e7a6 --- /dev/null +++ b/graph/incidents_graphml/b/b93d15e0-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.33 + 100.64.72.33 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659674854 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b93d15e0-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b93de650-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b93de650-634c-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea0b51d633e0f901c25c0c8a2b80ae8eb5ae3ad4 --- /dev/null +++ b/graph/incidents_graphml/b/b93de650-634c-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.56 + 100.64.9.56 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696489167 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b93de650-634c-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/b/b943cca0-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b943cca0-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d29c782820d67a75a7f16d2db786a192365d8c5f --- /dev/null +++ b/graph/incidents_graphml/b/b943cca0-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.33 + 100.64.72.33 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659674855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b943cca0-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b9456740-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/b/b9456740-9773-11ed-8e25-218966643970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6aeb183af0bf05657333005059ab31fa7204a099 --- /dev/null +++ b/graph/incidents_graphml/b/b9456740-9773-11ed-8e25-218966643970.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.25 + 100.64.1.25 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1674075880 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9456740-9773-11ed-8e25-218966643970 + + + INCIDENT_LINK + 1674075880 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9456740-9773-11ed-8e25-218966643970 + + + diff --git a/graph/incidents_graphml/b/b94aaa70-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b94aaa70-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7836c226c021f224d186d82b1b68b19b7208704 --- /dev/null +++ b/graph/incidents_graphml/b/b94aaa70-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.230 + 100.64.74.230 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659674855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b94aaa70-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b94d22f0-30ec-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/b/b94d22f0-30ec-11ef-bae8-75e6361c756f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50443d72dfebc16f20574d498a7cf896041702b8 --- /dev/null +++ b/graph/incidents_graphml/b/b94d22f0-30ec-11ef-bae8-75e6361c756f.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.179 + 100.64.16.179 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.252 + 100.64.26.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719097875 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b94d22f0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097875 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b94d22f0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097875 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b94d22f0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097875 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b94d22f0-30ec-11ef-bae8-75e6361c756f + + + diff --git a/graph/incidents_graphml/b/b950ec80-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/b950ec80-f6a1-11ee-8b23-bde5dce38992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..619a0534b7b378e83029d485717f0231306cd507 --- /dev/null +++ b/graph/incidents_graphml/b/b950ec80-f6a1-11ee-8b23-bde5dce38992.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712688495 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b950ec80-f6a1-11ee-8b23-bde5dce38992 + + + diff --git a/graph/incidents_graphml/b/b9513a20-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b9513a20-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb9744ee84ab857c90d68cc1fb49dc4386b84d1b --- /dev/null +++ b/graph/incidents_graphml/b/b9513a20-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.230 + 100.64.74.230 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659674855 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9513a20-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b95231a0-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b95231a0-634c-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59aea7bfdd7ea24c1810de10788085ff0330381f --- /dev/null +++ b/graph/incidents_graphml/b/b95231a0-634c-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.56 + 100.64.9.56 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696489167 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b95231a0-634c-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/b/b9530190-cff7-11ed-b87d-e343a0a76f13.graphml b/graph/incidents_graphml/b/b9530190-cff7-11ed-b87d-e343a0a76f13.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5dcd2361ae56e86396096a4d38118d9e07fad4de --- /dev/null +++ b/graph/incidents_graphml/b/b9530190-cff7-11ed-b87d-e343a0a76f13.graphml @@ -0,0 +1,323 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.1 + 100.64.69.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.118 + 100.64.68.118 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host"] + 0.905078125 + ["Precinct","Okta","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.2 + 100.64.69.2 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.3 + 100.64.69.3 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.65.56 + 100.64.65.56 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.143 + 100.64.68.143 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.4 + 100.64.69.4 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.5 + 100.64.69.5 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + INCIDENT_LINK + 1680289839 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9530190-cff7-11ed-b87d-e343a0a76f13 + + + diff --git a/graph/incidents_graphml/b/b9549580-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b9549580-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd386af99eec273510e6b9f5a504fbf9c139e6ee --- /dev/null +++ b/graph/incidents_graphml/b/b9549580-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.165 + 100.64.77.165 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659674855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9549580-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b95a3ad0-1479-11ed-8143-57b2da877ba3.graphml b/graph/incidents_graphml/b/b95a3ad0-1479-11ed-8143-57b2da877ba3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3642fe6f6d662f32221c26d30e07028cf1b797c --- /dev/null +++ b/graph/incidents_graphml/b/b95a3ad0-1479-11ed-8143-57b2da877ba3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.165 + 100.64.77.165 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659674855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b95a3ad0-1479-11ed-8143-57b2da877ba3 + + + diff --git a/graph/incidents_graphml/b/b963d5a0-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b963d5a0-f924-11ed-a4ab-835920bf1a34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f52c666f1d42315e7add28a5930dcd422acfee18 --- /dev/null +++ b/graph/incidents_graphml/b/b963d5a0-f924-11ed-a4ab-835920bf1a34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.10 + 100.64.19.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684817164 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b963d5a0-f924-11ed-a4ab-835920bf1a34 + + + diff --git a/graph/incidents_graphml/b/b9648120-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b9648120-634c-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1d35d4447f61202e20b3427272e7e693d481882 --- /dev/null +++ b/graph/incidents_graphml/b/b9648120-634c-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.58 + 100.64.9.58 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696489167 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b9648120-634c-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/b/b9670c90-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/b9670c90-f6a1-11ee-8b23-bde5dce38992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca856b666c5b349897a7c4880e4237afab7d80fc --- /dev/null +++ b/graph/incidents_graphml/b/b9670c90-f6a1-11ee-8b23-bde5dce38992.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712688495 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9670c90-f6a1-11ee-8b23-bde5dce38992 + + + diff --git a/graph/incidents_graphml/b/b9723cc0-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/b9723cc0-634c-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b454b69b3792c3e8f2b3fc072b0031cff8feda0 --- /dev/null +++ b/graph/incidents_graphml/b/b9723cc0-634c-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.58 + 100.64.9.58 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696489167 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9723cc0-634c-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/b/b979cea0-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b979cea0-f924-11ed-a4ab-835920bf1a34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4edd11a90278dec047c2254072100ef23d63a7c0 --- /dev/null +++ b/graph/incidents_graphml/b/b979cea0-f924-11ed-a4ab-835920bf1a34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.19.10 + 100.64.19.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684817164 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b979cea0-f924-11ed-a4ab-835920bf1a34 + + + diff --git a/graph/incidents_graphml/b/b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4ba52251e4a6f1b6529cba5c67bf43348db8aa2 --- /dev/null +++ b/graph/incidents_graphml/b/b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.113 + 100.64.72.113 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.31.165 + 100.64.31.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690711148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b98cd5b0-2ebf-11ee-9131-1117bdeaaaa3 + + + diff --git a/graph/incidents_graphml/b/b9965880-5604-11ee-9e22-15516bb414d1.graphml b/graph/incidents_graphml/b/b9965880-5604-11ee-9e22-15516bb414d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2bfcd5d6f074b47057847ea5822dd9f5ac1328f0 --- /dev/null +++ b/graph/incidents_graphml/b/b9965880-5604-11ee-9e22-15516bb414d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.159 + 100.64.14.159 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695028878 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b9965880-5604-11ee-9e22-15516bb414d1 + + + diff --git a/graph/incidents_graphml/b/b998b640-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/b/b998b640-fcc6-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23f077246be7a7cdbd8770ccfbe59439b57309ba --- /dev/null +++ b/graph/incidents_graphml/b/b998b640-fcc6-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.86 + 100.64.78.86 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.245 + 100.64.70.245 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.87 + 100.64.78.87 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657069098 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b998b640-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069098 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b998b640-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069098 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b998b640-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069098 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b998b640-fcc6-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/b/b99e09e0-3551-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/b/b99e09e0-3551-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9ad83143c66edcb7e916efc86bddec279dc3429 --- /dev/null +++ b/graph/incidents_graphml/b/b99e09e0-3551-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.17.24.119 + 172.17.24.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.95.140 + 100.64.95.140 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.100 + 100.64.95.100 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719581059 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b99e09e0-3551-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581059 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b99e09e0-3551-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581059 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b99e09e0-3551-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581059 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b99e09e0-3551-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/b/b9a683f0-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b9a683f0-f924-11ed-a4ab-835920bf1a34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12772e03460abdfc6bec6e26ca1742d3b44166df --- /dev/null +++ b/graph/incidents_graphml/b/b9a683f0-f924-11ed-a4ab-835920bf1a34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.12 + 100.64.19.12 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684817164 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9a683f0-f924-11ed-a4ab-835920bf1a34 + + + diff --git a/graph/incidents_graphml/b/b9b7c200-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b9b7c200-f924-11ed-a4ab-835920bf1a34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80dd8827518ee7d439f165e1ab227a570d0d5865 --- /dev/null +++ b/graph/incidents_graphml/b/b9b7c200-f924-11ed-a4ab-835920bf1a34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.19.12 + 100.64.19.12 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684817164 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9b7c200-f924-11ed-a4ab-835920bf1a34 + + + diff --git a/graph/incidents_graphml/b/b9c12cb0-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b9c12cb0-892a-11ed-9e45-31aae3dc518d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9e75e85eac846470ef11598e02d14e1dbcbec9d --- /dev/null +++ b/graph/incidents_graphml/b/b9c12cb0-892a-11ed-9e45-31aae3dc518d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.83 + 100.64.91.83 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-1965.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1672505211 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + b9c12cb0-892a-11ed-9e45-31aae3dc518d + + + diff --git a/graph/incidents_graphml/b/b9c25420-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/b/b9c25420-a0fb-11ee-b868-0b39d8f52622.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25c5725e303d896d0114a41e832ad91a10f77269 --- /dev/null +++ b/graph/incidents_graphml/b/b9c25420-a0fb-11ee-b868-0b39d8f52622.graphml @@ -0,0 +1,683 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.165 + 100.64.14.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.166 + 100.64.14.166 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.167 + 100.64.14.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.211 + 100.64.10.211 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.168 + 100.64.14.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Azure Security"] + + + HOST + 100.64.3.128 + 100.64.3.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.59 + 100.64.12.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.169 + 100.64.14.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.170 + 100.64.14.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.208 + 100.64.10.208 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.172 + 100.64.14.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.173 + 100.64.14.173 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.174 + 100.64.14.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.175 + 100.64.14.175 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.176 + 100.64.14.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + INCIDENT_LINK + 1703271350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9c25420-a0fb-11ee-b868-0b39d8f52622 + + + diff --git a/graph/incidents_graphml/b/b9c52450-892a-11ed-9e45-31aae3dc518d.graphml b/graph/incidents_graphml/b/b9c52450-892a-11ed-9e45-31aae3dc518d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52ea075d0dbb11937f999fd8ceaeaa2d172be69f --- /dev/null +++ b/graph/incidents_graphml/b/b9c52450-892a-11ed-9e45-31aae3dc518d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1965.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.83 + 100.64.91.83 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1672505211 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9c52450-892a-11ed-9e45-31aae3dc518d + + + diff --git a/graph/incidents_graphml/b/b9ce5380-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/b9ce5380-3d0d-11ee-ba1f-812391e2855d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcb86bf7d6c3321a6bf8e39abae062d08f27bef3 --- /dev/null +++ b/graph/incidents_graphml/b/b9ce5380-3d0d-11ee-ba1f-812391e2855d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.250 + 100.64.61.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283965 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9ce5380-3d0d-11ee-ba1f-812391e2855d + + + diff --git a/graph/incidents_graphml/b/b9d0c840-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b9d0c840-f924-11ed-a4ab-835920bf1a34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de7690cb99b6001229e4aaefa902a8aa97480541 --- /dev/null +++ b/graph/incidents_graphml/b/b9d0c840-f924-11ed-a4ab-835920bf1a34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.165 + 100.64.10.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684817165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9d0c840-f924-11ed-a4ab-835920bf1a34 + + + diff --git a/graph/incidents_graphml/b/b9d232a0-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/b/b9d232a0-a0fb-11ee-b868-0b39d8f52622.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c095faf8e91b15925e11bebd7cb9e18737e9c80d --- /dev/null +++ b/graph/incidents_graphml/b/b9d232a0-a0fb-11ee-b868-0b39d8f52622.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.165 + 100.64.14.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703271351 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9d232a0-a0fb-11ee-b868-0b39d8f52622 + + + diff --git a/graph/incidents_graphml/b/b9e22910-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/b/b9e22910-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6921ca29a60283c8c859cfc6511498fde16a910f --- /dev/null +++ b/graph/incidents_graphml/b/b9e22910-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.221 + 100.64.24.221 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672888 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b9e22910-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/b/b9e7aba0-f924-11ed-a4ab-835920bf1a34.graphml b/graph/incidents_graphml/b/b9e7aba0-f924-11ed-a4ab-835920bf1a34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0cb3af8dfd1b93c462244697436d3aaf9989dae8 --- /dev/null +++ b/graph/incidents_graphml/b/b9e7aba0-f924-11ed-a4ab-835920bf1a34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.10.165 + 100.64.10.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684817165 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9e7aba0-f924-11ed-a4ab-835920bf1a34 + + + diff --git a/graph/incidents_graphml/b/b9ef9b20-57bc-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/b/b9ef9b20-57bc-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62fca7a2231fdfeedb13b1152637f86d162001fc --- /dev/null +++ b/graph/incidents_graphml/b/b9ef9b20-57bc-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.119 + 100.64.11.119 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695217858 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9ef9b20-57bc-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695217858 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9ef9b20-57bc-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/b/b9f38ec0-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/b9f38ec0-3d0d-11ee-ba1f-812391e2855d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be77264c273fb30f8f9ca5f16ce1b36d36617225 --- /dev/null +++ b/graph/incidents_graphml/b/b9f38ec0-3d0d-11ee-ba1f-812391e2855d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.26 + 100.64.66.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283966 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9f38ec0-3d0d-11ee-ba1f-812391e2855d + + + diff --git a/graph/incidents_graphml/b/b9fae130-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/b/b9fae130-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b1ebaca7748df7dd47aeb321c5b3f818a95740a --- /dev/null +++ b/graph/incidents_graphml/b/b9fae130-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.221 + 100.64.24.221 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672889 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + b9fae130-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/b/b9fba880-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/b9fba880-d3d0-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40a74803d1efc2c5dfbdec0e18681a7ebed0e658 --- /dev/null +++ b/graph/incidents_graphml/b/b9fba880-d3d0-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.77 + 100.64.3.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708860392 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9fba880-d3d0-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/b/b9fc4290-1553-11ee-a373-07433a95fe5c.graphml b/graph/incidents_graphml/b/b9fc4290-1553-11ee-a373-07433a95fe5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e47f8c0c9de13e184d326539568e53987c0a366 --- /dev/null +++ b/graph/incidents_graphml/b/b9fc4290-1553-11ee-a373-07433a95fe5c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.119 + 100.64.7.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687915984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + b9fc4290-1553-11ee-a373-07433a95fe5c + + + diff --git a/graph/incidents_graphml/b/b9fd5060-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/b9fd5060-ebef-11ec-9679-75d3d6184114.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d0e4aee8a62358255c7b7c560faab30dfb31ba1 --- /dev/null +++ b/graph/incidents_graphml/b/b9fd5060-ebef-11ec-9679-75d3d6184114.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.1 + 100.64.80.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655217539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b9fd5060-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + b9fd5060-ebef-11ec-9679-75d3d6184114 + + + diff --git a/graph/incidents_graphml/b/ba016ae0-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/b/ba016ae0-f613-11ed-a3d6-ad85d59eee66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7feca573bc528a4d3ba32351e3f0cfa67d5435d --- /dev/null +++ b/graph/incidents_graphml/b/ba016ae0-f613-11ed-a3d6-ad85d59eee66.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.88 + 100.64.73.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.220 + 100.64.71.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.77.172 + 100.64.77.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.173 + 100.64.77.173 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1684480010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba016ae0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba016ae0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba016ae0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba016ae0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba016ae0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba016ae0-f613-11ed-a3d6-ad85d59eee66 + + + diff --git a/graph/incidents_graphml/b/ba0513b0-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/ba0513b0-258f-11ee-aa0d-9950110e3974.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cd1234e01bd58c82ffd10814bb8040ae500b4b1 --- /dev/null +++ b/graph/incidents_graphml/b/ba0513b0-258f-11ee-aa0d-9950110e3974.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.39 + 100.64.25.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689700972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba0513b0-258f-11ee-aa0d-9950110e3974 + + + diff --git a/graph/incidents_graphml/b/ba17e3d0-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/ba17e3d0-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c1852f5abd5c3a7989c16560d1b678d28901ba1 --- /dev/null +++ b/graph/incidents_graphml/b/ba17e3d0-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.22 + 100.64.35.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844362 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba17e3d0-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/ba2015c0-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/ba2015c0-258f-11ee-aa0d-9950110e3974.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ee1c9a1dad8c33a4a77ed7cc53ce1832ae40746 --- /dev/null +++ b/graph/incidents_graphml/b/ba2015c0-258f-11ee-aa0d-9950110e3974.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.39 + 100.64.25.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689700972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba2015c0-258f-11ee-aa0d-9950110e3974 + + + diff --git a/graph/incidents_graphml/b/ba2215f0-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/ba2215f0-fe9d-11ed-b0fc-1f31d51c8878.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed0adb673cd9a73499a97ca4b1aa94f120a360e9 --- /dev/null +++ b/graph/incidents_graphml/b/ba2215f0-fe9d-11ed-b0fc-1f31d51c8878.graphml @@ -0,0 +1,705 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.15.156 + 100.64.15.156 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.129 + 100.64.18.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.18.130 + 100.64.18.130 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.18 + 100.64.7.18 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.131 + 100.64.18.131 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.132 + 100.64.18.132 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.18.133 + 100.64.18.133 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.134 + 100.64.18.134 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.135 + 100.64.18.135 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.136 + 100.64.18.136 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.137 + 100.64.18.137 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.138 + 100.64.18.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.139 + 100.64.18.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.18.140 + 100.64.18.140 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.144 + 100.64.12.144 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.18.141 + 100.64.18.141 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.142 + 100.64.18.142 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + INCIDENT_LINK + 1685418890 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba2215f0-fe9d-11ed-b0fc-1f31d51c8878 + + + diff --git a/graph/incidents_graphml/b/ba24dc20-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/ba24dc20-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc2d688ccd7ecaceed21e0a0d54a1f45de66049d --- /dev/null +++ b/graph/incidents_graphml/b/ba24dc20-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.22 + 100.64.35.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844362 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba24dc20-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/ba2533b0-2ff4-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/b/ba2533b0-2ff4-11ee-b00f-c1ca007fb916.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd738696050e3031256fe54c0d63590176d32986 --- /dev/null +++ b/graph/incidents_graphml/b/ba2533b0-2ff4-11ee-b00f-c1ca007fb916.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.26 + 100.64.58.26 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690843863 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba2533b0-2ff4-11ee-b00f-c1ca007fb916 + + + INCIDENT_LINK + 1690843863 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba2533b0-2ff4-11ee-b00f-c1ca007fb916 + + + diff --git a/graph/incidents_graphml/b/ba333d20-029b-11ed-9608-918c8d74993e.graphml b/graph/incidents_graphml/b/ba333d20-029b-11ed-9608-918c8d74993e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1d7303ab5cd5457e117e17a31585442eca5260b --- /dev/null +++ b/graph/incidents_graphml/b/ba333d20-029b-11ed-9608-918c8d74993e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.151 + 100.64.61.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.147 + 100.64.71.147 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657710338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba333d20-029b-11ed-9608-918c8d74993e + + + diff --git a/graph/incidents_graphml/b/ba33a930-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/ba33a930-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17bddb5ae997f70cf589ea4a3fb180d69b8fe583 --- /dev/null +++ b/graph/incidents_graphml/b/ba33a930-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.245 + 100.64.54.245 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844362 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba33a930-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/ba37f810-029b-11ed-9608-918c8d74993e.graphml b/graph/incidents_graphml/b/ba37f810-029b-11ed-9608-918c8d74993e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..139218f09ac6f9f95a871982b81443fee8574924 --- /dev/null +++ b/graph/incidents_graphml/b/ba37f810-029b-11ed-9608-918c8d74993e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.69 + 100.64.80.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657710338 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba37f810-029b-11ed-9608-918c8d74993e + + + diff --git a/graph/incidents_graphml/b/ba392060-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/ba392060-fe9d-11ed-b0fc-1f31d51c8878.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0f6af3b6a2cfe9b47e227d22dd03e0fc9cc8811 --- /dev/null +++ b/graph/incidents_graphml/b/ba392060-fe9d-11ed-b0fc-1f31d51c8878.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.159 + 100.64.18.159 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685418890 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba392060-fe9d-11ed-b0fc-1f31d51c8878 + + + diff --git a/graph/incidents_graphml/b/ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72.graphml b/graph/incidents_graphml/b/ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d017fda65988fdd150dd111f01fa9c4a20ed82b --- /dev/null +++ b/graph/incidents_graphml/b/ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.212 + 100.64.68.212 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1711616043 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711616043 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba3a0ca0-ece0-11ee-ac0b-e5fde63aeb72 + + + diff --git a/graph/incidents_graphml/b/ba3b5920-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/ba3b5920-634c-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7ee16a953046d8d2a77e42ecfdf888e676c43d9 --- /dev/null +++ b/graph/incidents_graphml/b/ba3b5920-634c-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.60 + 100.64.9.60 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696489168 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba3b5920-634c-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/b/ba424f30-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/ba424f30-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fed22bb0897981fd63eb538f921582e578d2a2ea --- /dev/null +++ b/graph/incidents_graphml/b/ba424f30-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.245 + 100.64.54.245 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844362 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ba424f30-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/ba50c920-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/ba50c920-f135-11ec-9654-cb9d1f320859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e2f626fda65950ae155f5333d50e558e6eee877 --- /dev/null +++ b/graph/incidents_graphml/b/ba50c920-f135-11ec-9654-cb9d1f320859.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.157 + USER-0015-1703.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.33 + 100.64.75.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655797360 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba50c920-f135-11ec-9654-cb9d1f320859 + + + INCIDENT_LINK + 1655797360 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba50c920-f135-11ec-9654-cb9d1f320859 + + + diff --git a/graph/incidents_graphml/b/ba529bd0-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/ba529bd0-fe9d-11ed-b0fc-1f31d51c8878.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2deb37a646afe3ee52c56b601f20adabc1bec301 --- /dev/null +++ b/graph/incidents_graphml/b/ba529bd0-fe9d-11ed-b0fc-1f31d51c8878.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.18.159 + 100.64.18.159 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685418890 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba529bd0-fe9d-11ed-b0fc-1f31d51c8878 + + + diff --git a/graph/incidents_graphml/b/ba52ccf0-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/ba52ccf0-a5e0-11ee-af6c-2f69bce079e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5819363e1e6d701219d2c09d1188d87f6588b33d --- /dev/null +++ b/graph/incidents_graphml/b/ba52ccf0-a5e0-11ee-af6c-2f69bce079e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.217 + 100.64.27.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703809511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba52ccf0-a5e0-11ee-af6c-2f69bce079e5 + + + diff --git a/graph/incidents_graphml/b/ba574590-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/ba574590-634c-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..955e4b93f3bf6012721543f73c9427276129f9d4 --- /dev/null +++ b/graph/incidents_graphml/b/ba574590-634c-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.62 + 100.64.9.62 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696489169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba574590-634c-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/b/ba5de6f0-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/ba5de6f0-ebef-11ec-9679-75d3d6184114.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03c1b7b528ea902e539e4af45e4ceb7961333dc7 --- /dev/null +++ b/graph/incidents_graphml/b/ba5de6f0-ebef-11ec-9679-75d3d6184114.graphml @@ -0,0 +1,243 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.28 + 100.64.1.28 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.212 + 100.64.73.212 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.80.2 + 100.64.80.2 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.80.3 + 100.64.80.3 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.80.4 + 100.64.80.4 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.80.5 + 100.64.80.5 + ["Exploiting Target"] + 0.7525 + ["Precinct","Meraki"] + + + HOST + 100.64.80.6 + 100.64.80.6 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217539 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba5de6f0-ebef-11ec-9679-75d3d6184114 + + + diff --git a/graph/incidents_graphml/b/ba613b40-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/ba613b40-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97a560213c6f884824aa16d4a2199c5e689f2396 --- /dev/null +++ b/graph/incidents_graphml/b/ba613b40-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.44 + 100.64.72.44 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba613b40-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/b/ba6320a0-a5e0-11ee-af6c-2f69bce079e5.graphml b/graph/incidents_graphml/b/ba6320a0-a5e0-11ee-af6c-2f69bce079e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fac376deceb5858296c1476f67cbcd3b7b5f6396 --- /dev/null +++ b/graph/incidents_graphml/b/ba6320a0-a5e0-11ee-af6c-2f69bce079e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.217 + 100.64.27.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703809511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ba6320a0-a5e0-11ee-af6c-2f69bce079e5 + + + diff --git a/graph/incidents_graphml/b/ba6f2690-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/ba6f2690-f135-11ec-9654-cb9d1f320859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98028c57a9acb3acbef24be1328e46b5b0719bbb --- /dev/null +++ b/graph/incidents_graphml/b/ba6f2690-f135-11ec-9654-cb9d1f320859.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.34 + USER-0015-1704.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655797360 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba6f2690-f135-11ec-9654-cb9d1f320859 + + + diff --git a/graph/incidents_graphml/b/ba742f90-2cea-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/b/ba742f90-2cea-11ee-b828-99998b56933c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbfce59854f6acfcdb4a8fef7443b0c4de18e55a --- /dev/null +++ b/graph/incidents_graphml/b/ba742f90-2cea-11ee-b828-99998b56933c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.235.180 + 192.168.235.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.234 + 100.64.82.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690509715 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba742f90-2cea-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690509715 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba742f90-2cea-11ee-b828-99998b56933c + + + diff --git a/graph/incidents_graphml/b/ba74df90-2824-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/b/ba74df90-2824-11ef-b581-4d62d2263ef1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0b684797ae7ba1eb60decd20a666ff2c5a30a14 --- /dev/null +++ b/graph/incidents_graphml/b/ba74df90-2824-11ef-b581-4d62d2263ef1.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.121 + 100.64.97.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.94.153 + 100.64.94.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.122 + 100.64.97.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.210 + 100.64.40.210 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.123 + 100.64.97.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.41.118 + 100.64.41.118 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.77 + 100.64.3.77 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.252 + 100.64.38.252 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.124 + 100.64.97.124 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.125 + 100.64.97.125 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.116 + 100.64.51.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.126 + 100.64.97.126 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132368 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ba74df90-2824-11ef-b581-4d62d2263ef1 + + + diff --git a/graph/incidents_graphml/b/ba78b040-634c-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/b/ba78b040-634c-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d1412926102adf1fef83183738bd79391231b04 --- /dev/null +++ b/graph/incidents_graphml/b/ba78b040-634c-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.64 + 100.64.9.64 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696489169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba78b040-634c-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/b/ba85b330-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/ba85b330-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a69d03014acda307d1dc2203ee4676280d996dbc --- /dev/null +++ b/graph/incidents_graphml/b/ba85b330-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.44 + 100.64.72.44 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ba85b330-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/b/ba933ba0-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/b/ba933ba0-3150-11ee-9a81-45e5b946e7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9616a162cb67136bdcd877db04ba4ee19d9a4f90 --- /dev/null +++ b/graph/incidents_graphml/b/ba933ba0-3150-11ee-9a81-45e5b946e7a5.graphml @@ -0,0 +1,561 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.118 + 100.64.9.118 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.119 + 100.64.9.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.121 + 100.64.9.121 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.123 + 100.64.9.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.124 + 100.64.9.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.125 + 100.64.9.125 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.127 + 100.64.9.127 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.128 + 100.64.9.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.129 + 100.64.9.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.130 + 100.64.9.130 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.131 + 100.64.9.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba933ba0-3150-11ee-9a81-45e5b946e7a5 + + + diff --git a/graph/incidents_graphml/b/ba9fac70-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/ba9fac70-f135-11ec-9654-cb9d1f320859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e74ce56c680849bde8e29240ae3895305da21b0 --- /dev/null +++ b/graph/incidents_graphml/b/ba9fac70-f135-11ec-9654-cb9d1f320859.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.38 + 100.64.75.38 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655797360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ba9fac70-f135-11ec-9654-cb9d1f320859 + + + diff --git a/graph/incidents_graphml/b/baa87d70-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/baa87d70-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3efa7158f5c7c0b0636a72f0f4cc020873744b7b --- /dev/null +++ b/graph/incidents_graphml/b/baa87d70-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,207 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.167 + 100.64.72.167 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.194 + 100.64.82.194 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.195 + 100.64.82.195 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.196 + 100.64.82.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.199 + 100.64.72.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.197 + 100.64.82.197 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baa87d70-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baa87d70-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baa87d70-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baa87d70-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baa87d70-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baa87d70-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baa87d70-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baa87d70-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010176 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baa87d70-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/b/baaa0b20-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/baaa0b20-ebef-11ec-9679-75d3d6184114.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06efa2d0fd890a49593a65e57cc3c526e5714a8e --- /dev/null +++ b/graph/incidents_graphml/b/baaa0b20-ebef-11ec-9679-75d3d6184114.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.231 + 100.64.43.231 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.91 + 100.64.72.91 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655217540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + baaa0b20-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + baaa0b20-ebef-11ec-9679-75d3d6184114 + + + diff --git a/graph/incidents_graphml/b/baada910-3fad-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/b/baada910-3fad-11ef-931a-1d289e4afac0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3821cb308eb90fd5898c79233ed64d5af91fb59b --- /dev/null +++ b/graph/incidents_graphml/b/baada910-3fad-11ef-931a-1d289e4afac0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.238 + 100.64.66.238 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720720086 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + baada910-3fad-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720720086 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + baada910-3fad-11ef-931a-1d289e4afac0 + + + diff --git a/graph/incidents_graphml/b/bab51340-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/bab51340-3c0b-11ee-8ad1-f5005abd06b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6728423a9358c829d3a300c0f623f11135385b9 --- /dev/null +++ b/graph/incidents_graphml/b/bab51340-3c0b-11ee-8ad1-f5005abd06b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.64 + 100.64.85.64 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692173157 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bab51340-3c0b-11ee-8ad1-f5005abd06b8 + + + diff --git a/graph/incidents_graphml/b/bab51da0-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/b/bab51da0-210c-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f33037d41aace5442cf037805fa8ec0d2fb1b0e1 --- /dev/null +++ b/graph/incidents_graphml/b/bab51da0-210c-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.46 + 100.64.22.46 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689204905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bab51da0-210c-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/b/bab8d380-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bab8d380-d30b-11ee-ab07-630a66777c1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e66d9209de7fce5ed1fae8b07bca84d65b00ef6 --- /dev/null +++ b/graph/incidents_graphml/b/bab8d380-d30b-11ee-ab07-630a66777c1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.176 + 100.64.38.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708775782 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bab8d380-d30b-11ee-ab07-630a66777c1a + + + diff --git a/graph/incidents_graphml/b/bac42460-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/bac42460-f135-11ec-9654-cb9d1f320859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41f2129dd8c8436932829d6a4e3f96e932ba26e7 --- /dev/null +++ b/graph/incidents_graphml/b/bac42460-f135-11ec-9654-cb9d1f320859.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.38 + 100.64.75.38 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655797361 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bac42460-f135-11ec-9654-cb9d1f320859 + + + diff --git a/graph/incidents_graphml/b/bacd9000-56b4-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/b/bacd9000-56b4-11ee-be44-f1fe26834d88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7bb61541b450298d4e799cc7d4c251e956879e3b --- /dev/null +++ b/graph/incidents_graphml/b/bacd9000-56b4-11ee-be44-f1fe26834d88.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1695104472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bacd9000-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bacd9000-56b4-11ee-be44-f1fe26834d88 + + + diff --git a/graph/incidents_graphml/b/bad0a5a0-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/bad0a5a0-ba66-11ed-ace2-c7d81fb15087.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a6012f377a9a06a2affa27421a1b139192df9ea --- /dev/null +++ b/graph/incidents_graphml/b/bad0a5a0-ba66-11ed-ace2-c7d81fb15087.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.226 + USER-0015-1727.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.16.70 + 100.64.16.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.16.193 + 100.64.16.193 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.75.223 + 100.64.75.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.85 + 100.64.71.85 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.75.224 + 100.64.75.224 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.75.225 + 100.64.75.225 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.75.226 + 100.64.75.226 + ["Exploiting Target","Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.227 + 100.64.75.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.225 + 100.64.71.225 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.71.147 + 100.64.71.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.228 + 100.64.75.228 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.229 + 100.64.75.229 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918590 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bad0a5a0-ba66-11ed-ace2-c7d81fb15087 + + + diff --git a/graph/incidents_graphml/b/bad580e0-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/bad580e0-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49fa5834d918936077b5ac65dc7e7657169ee722 --- /dev/null +++ b/graph/incidents_graphml/b/bad580e0-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.192 + 100.64.82.192 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687010177 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bad580e0-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/b/bae06630-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/bae06630-39e0-11ee-b92b-37d2cd449a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f85c87e4074cdb860f008434bafba51d5889793 --- /dev/null +++ b/graph/incidents_graphml/b/bae06630-39e0-11ee-b92b-37d2cd449a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.215 + 100.64.31.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691934786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bae06630-39e0-11ee-b92b-37d2cd449a32 + + + diff --git a/graph/incidents_graphml/b/bae2cff0-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/b/bae2cff0-f135-11ec-9654-cb9d1f320859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..651002302224bb80ce668361ce3f4aecf08bf523 --- /dev/null +++ b/graph/incidents_graphml/b/bae2cff0-f135-11ec-9654-cb9d1f320859.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.97 + USER-0015-1705.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655797361 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bae2cff0-f135-11ec-9654-cb9d1f320859 + + + diff --git a/graph/incidents_graphml/b/bae9b7d0-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/bae9b7d0-3c0b-11ee-8ad1-f5005abd06b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d7dccae4e95adaa378408db8edf12549c665fe1 --- /dev/null +++ b/graph/incidents_graphml/b/bae9b7d0-3c0b-11ee-8ad1-f5005abd06b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.65 + 100.64.85.65 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692173157 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bae9b7d0-3c0b-11ee-8ad1-f5005abd06b8 + + + diff --git a/graph/incidents_graphml/b/baf0b590-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/baf0b590-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46d6f563cfc89c30875456ea64b8bfdbd2b4bea8 --- /dev/null +++ b/graph/incidents_graphml/b/baf0b590-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.111 + 100.64.7.111 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616495 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baf0b590-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/baf35f20-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/b/baf35f20-210c-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ea44ab341a23ef9082a0d88c5f77d055b357f74 --- /dev/null +++ b/graph/incidents_graphml/b/baf35f20-210c-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.46 + 100.64.22.46 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689204905 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + baf35f20-210c-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/b/bb034600-56b4-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/b/bb034600-56b4-11ee-be44-f1fe26834d88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0eddf8a88ac18b167f3a437d2c20e65cc9ed0e0 --- /dev/null +++ b/graph/incidents_graphml/b/bb034600-56b4-11ee-be44-f1fe26834d88.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.97 + 100.64.42.97 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.40.143 + 100.64.40.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695104472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb034600-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb034600-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb034600-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb034600-56b4-11ee-be44-f1fe26834d88 + + + diff --git a/graph/incidents_graphml/b/bb056a80-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/bb056a80-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6582579222f64d2d6e57cfd3d7e388dbc864e528 --- /dev/null +++ b/graph/incidents_graphml/b/bb056a80-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.192 + 100.64.82.192 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687010177 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb056a80-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/b/bb0ac840-fe9d-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/b/bb0ac840-fe9d-11ed-b0fc-1f31d51c8878.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f7906f0c67af47fc9f3151155b740af64dc9b7e --- /dev/null +++ b/graph/incidents_graphml/b/bb0ac840-fe9d-11ed-b0fc-1f31d51c8878.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.161 + 100.64.18.161 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685418892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb0ac840-fe9d-11ed-b0fc-1f31d51c8878 + + + diff --git a/graph/incidents_graphml/b/bb0ca2f0-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/b/bb0ca2f0-28a0-11ee-a420-712e71e90fc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..faa82c02a3adbf3b4cca1a3e2967f854d44f1a35 --- /dev/null +++ b/graph/incidents_graphml/b/bb0ca2f0-28a0-11ee-a420-712e71e90fc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.228 + 100.64.59.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690038129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb0ca2f0-28a0-11ee-a420-712e71e90fc3 + + + diff --git a/graph/incidents_graphml/b/bb144320-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb144320-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4559162b04e7d6485ce430214309a0032625d95 --- /dev/null +++ b/graph/incidents_graphml/b/bb144320-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.111 + 100.64.7.111 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616495 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb144320-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/bb152450-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bb152450-d30b-11ee-ab07-630a66777c1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7dde0048b0683f61f8a6a6204ff73f92b931fd07 --- /dev/null +++ b/graph/incidents_graphml/b/bb152450-d30b-11ee-ab07-630a66777c1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.178 + 100.64.38.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708775783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb152450-d30b-11ee-ab07-630a66777c1a + + + diff --git a/graph/incidents_graphml/b/bb1b9d40-3c0b-11ee-8ad1-f5005abd06b8.graphml b/graph/incidents_graphml/b/bb1b9d40-3c0b-11ee-8ad1-f5005abd06b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8cb877fb433196352fec6eeeaf3c6b444c43c7b --- /dev/null +++ b/graph/incidents_graphml/b/bb1b9d40-3c0b-11ee-8ad1-f5005abd06b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.67 + 100.64.85.67 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692173157 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb1b9d40-3c0b-11ee-8ad1-f5005abd06b8 + + + diff --git a/graph/incidents_graphml/b/bb2355e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/b/bb2355e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5adef4a91981efc17a528a3e23661f58ddb83128 --- /dev/null +++ b/graph/incidents_graphml/b/bb2355e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175672 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb2355e0-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/b/bb24b4b0-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bb24b4b0-d30b-11ee-ab07-630a66777c1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ab0441cd84d387a6646d1e8f53509452164d6d7 --- /dev/null +++ b/graph/incidents_graphml/b/bb24b4b0-d30b-11ee-ab07-630a66777c1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.178 + 100.64.38.178 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708775783 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb24b4b0-d30b-11ee-ab07-630a66777c1a + + + diff --git a/graph/incidents_graphml/b/bb2708c0-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/b/bb2708c0-28a0-11ee-a420-712e71e90fc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3384662aec7e7040bd1b24e0cf9f5a6dee4908ff --- /dev/null +++ b/graph/incidents_graphml/b/bb2708c0-28a0-11ee-a420-712e71e90fc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.228 + 100.64.59.228 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690038129 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb2708c0-28a0-11ee-a420-712e71e90fc3 + + + diff --git a/graph/incidents_graphml/b/bb292ab0-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb292ab0-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..760dd3317918082102e2a2d4e040167f406710f5 --- /dev/null +++ b/graph/incidents_graphml/b/bb292ab0-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616495 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb292ab0-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/bb29cb80-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/bb29cb80-95ae-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..792359305e6766d52815ea864f5bd4ccabfd09f4 --- /dev/null +++ b/graph/incidents_graphml/b/bb29cb80-95ae-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.68.136.46 + 10.68.136.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.237 + 100.64.75.237 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1673881321 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb29cb80-95ae-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673881321 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb29cb80-95ae-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/b/bb2c1570-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/bb2c1570-95ae-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5bf91ae587bfb40e40952c848444c9789ff6fc7 --- /dev/null +++ b/graph/incidents_graphml/b/bb2c1570-95ae-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.238 + 100.64.75.238 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.221 + 100.64.71.221 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1673881321 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb2c1570-95ae-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673881321 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb2c1570-95ae-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/b/bb329820-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/b/bb329820-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88b4265a6d4b13e98f51c7ed51313f07c7bbfe84 --- /dev/null +++ b/graph/incidents_graphml/b/bb329820-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175672 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb329820-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/b/bb3667f0-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bb3667f0-d30b-11ee-ab07-630a66777c1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ec1ef955c604a3bc4ba0395071b622e8fdeeb79 --- /dev/null +++ b/graph/incidents_graphml/b/bb3667f0-d30b-11ee-ab07-630a66777c1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.41 + 100.64.19.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708775783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb3667f0-d30b-11ee-ab07-630a66777c1a + + + diff --git a/graph/incidents_graphml/b/bb3a8a80-a33a-11ed-a505-7f4e35fde98f.graphml b/graph/incidents_graphml/b/bb3a8a80-a33a-11ed-a505-7f4e35fde98f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06f8a9de5230e52bd6444a91375f3d6a38351b96 --- /dev/null +++ b/graph/incidents_graphml/b/bb3a8a80-a33a-11ed-a505-7f4e35fde98f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.107 + 100.64.78.107 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.78.189 + 100.64.78.189 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1675370816 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb3a8a80-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370816 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb3a8a80-a33a-11ed-a505-7f4e35fde98f + + + diff --git a/graph/incidents_graphml/b/bb4453d0-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb4453d0-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..678000a4f5283497595862ce7639243f067fed81 --- /dev/null +++ b/graph/incidents_graphml/b/bb4453d0-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616495 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb4453d0-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/bb4a3e10-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bb4a3e10-d30b-11ee-ab07-630a66777c1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07b68fd00f63cec614a13a2f0d4c1b8c7b2f1722 --- /dev/null +++ b/graph/incidents_graphml/b/bb4a3e10-d30b-11ee-ab07-630a66777c1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.41 + 100.64.19.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708775783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb4a3e10-d30b-11ee-ab07-630a66777c1a + + + diff --git a/graph/incidents_graphml/b/bb5bfa80-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb5bfa80-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..012f21054278d7a0e98ad3b6613c8bc557135953 --- /dev/null +++ b/graph/incidents_graphml/b/bb5bfa80-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.115 + 100.64.7.115 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616495 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb5bfa80-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/bb664e10-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/b/bb664e10-138b-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b8ff91eed043af130144761c0d8dd71cd0579f3 --- /dev/null +++ b/graph/incidents_graphml/b/bb664e10-138b-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.78 + 100.64.74.78 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.102 + USER-0015-1636.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687720136 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb664e10-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720136 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb664e10-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720136 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb664e10-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720136 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb664e10-138b-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/b/bb790fc0-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/b/bb790fc0-1fe1-11ee-80ac-1985e110d782.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d944b3528b088ccfd17a78f47ce86e0a45ac63f5 --- /dev/null +++ b/graph/incidents_graphml/b/bb790fc0-1fe1-11ee-80ac-1985e110d782.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.40 + 100.64.57.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689076487 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb790fc0-1fe1-11ee-80ac-1985e110d782 + + + diff --git a/graph/incidents_graphml/b/bb8381c0-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bb8381c0-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fe7af95b1c4f1bcd5499d58493d8cfc25eb390c --- /dev/null +++ b/graph/incidents_graphml/b/bb8381c0-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.247 + 100.64.54.247 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844364 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bb8381c0-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/bb880a30-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bb880a30-258f-11ee-aa0d-9950110e3974.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a84dc0d3a2e1bd5593fd57686bd1692fa21ca0a0 --- /dev/null +++ b/graph/incidents_graphml/b/bb880a30-258f-11ee-aa0d-9950110e3974.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689700975 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb880a30-258f-11ee-aa0d-9950110e3974 + + + diff --git a/graph/incidents_graphml/b/bb88d6e0-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bb88d6e0-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29f8153cef9da8f582d064c21540c561eb270d37 --- /dev/null +++ b/graph/incidents_graphml/b/bb88d6e0-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.115 + 100.64.7.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616496 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb88d6e0-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/bb8a1370-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bb8a1370-6400-11ee-a904-77b5e02bdb5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49716dce43c579947c0fd15615671d6260493f35 --- /dev/null +++ b/graph/incidents_graphml/b/bb8a1370-6400-11ee-a904-77b5e02bdb5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.183 + 100.64.18.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696566480 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bb8a1370-6400-11ee-a904-77b5e02bdb5f + + + diff --git a/graph/incidents_graphml/b/bb91b290-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bb91b290-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a5cff4315d6e10f876a899f64e26bb6ae19e8c5 --- /dev/null +++ b/graph/incidents_graphml/b/bb91b290-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.247 + 100.64.54.247 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844364 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb91b290-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/bb9a7a70-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/b/bb9a7a70-1fe1-11ee-80ac-1985e110d782.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36ff572b8afde3eae0d113b6572c47b21bfdd4ea --- /dev/null +++ b/graph/incidents_graphml/b/bb9a7a70-1fe1-11ee-80ac-1985e110d782.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.40 + 100.64.57.40 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689076487 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bb9a7a70-1fe1-11ee-80ac-1985e110d782 + + + diff --git a/graph/incidents_graphml/b/bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/b/bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed957a450106a6a6ca6b3b3a5bb45de4761ba866 --- /dev/null +++ b/graph/incidents_graphml/b/bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.88 + 100.64.78.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657069102 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069102 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069102 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069102 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bba464c0-fcc6-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/b/bba5ef70-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bba5ef70-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f84c2e3e0f05e7f740f105365c625622459bd39d --- /dev/null +++ b/graph/incidents_graphml/b/bba5ef70-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.3 + 100.64.34.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788890 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bba5ef70-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/b/bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/b/bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6829e415499211fef8b7f07885168aa3ac4224b --- /dev/null +++ b/graph/incidents_graphml/b/bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.89 + 100.64.78.89 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.63 + USER-0015-1731.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657069102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bba723e0-fcc6-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/b/bba95730-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bba95730-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..464d108704f837204fc3ccb25bec2f626f65a457 --- /dev/null +++ b/graph/incidents_graphml/b/bba95730-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.73 + 100.64.7.73 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616496 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bba95730-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/bbaa3ff0-2f9a-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/b/bbaa3ff0-2f9a-11ee-812f-67af952e62fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddd2a583429d0ed4323406c564499451fb350ab4 --- /dev/null +++ b/graph/incidents_graphml/b/bbaa3ff0-2f9a-11ee-812f-67af952e62fd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.138 + 100.64.68.138 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690805211 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbaa3ff0-2f9a-11ee-812f-67af952e62fd + + + INCIDENT_LINK + 1690805211 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbaa3ff0-2f9a-11ee-812f-67af952e62fd + + + diff --git a/graph/incidents_graphml/b/bbabe5e0-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bbabe5e0-258f-11ee-aa0d-9950110e3974.graphml new file mode 100644 index 0000000000000000000000000000000000000000..088f404312f64d9e28c31abf2a6552eab10b26de --- /dev/null +++ b/graph/incidents_graphml/b/bbabe5e0-258f-11ee-aa0d-9950110e3974.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689700975 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bbabe5e0-258f-11ee-aa0d-9950110e3974 + + + diff --git a/graph/incidents_graphml/b/bbb1bd20-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/b/bbb1bd20-09ab-11ef-a326-59a1bcca7fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2bb252725d19f851b0f4d1eb05e103eb7f4260c1 --- /dev/null +++ b/graph/incidents_graphml/b/bbb1bd20-09ab-11ef-a326-59a1bcca7fdf.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.181 + 100.64.2.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.255 + 100.64.14.255 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714781866 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bbb1bd20-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781866 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bbb1bd20-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781866 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bbb1bd20-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781866 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bbb1bd20-09ab-11ef-a326-59a1bcca7fdf + + + diff --git a/graph/incidents_graphml/b/bbbe8810-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/bbbe8810-ba66-11ed-ace2-c7d81fb15087.graphml new file mode 100644 index 0000000000000000000000000000000000000000..605562709810126b18d17f91c41253402b8b8201 --- /dev/null +++ b/graph/incidents_graphml/b/bbbe8810-ba66-11ed-ace2-c7d81fb15087.graphml @@ -0,0 +1,669 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.16.193 + 100.64.16.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.75.223 + 100.64.75.223 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.85 + 100.64.71.85 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.75.224 + 100.64.75.224 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.225 + 100.64.75.225 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.75.226 + 100.64.75.226 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.227 + 100.64.75.227 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.225 + 100.64.71.225 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.71.147 + 100.64.71.147 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.228 + 100.64.75.228 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.229 + 100.64.75.229 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + INCIDENT_LINK + 1677918591 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbbe8810-ba66-11ed-ace2-c7d81fb15087 + + + diff --git a/graph/incidents_graphml/b/bbc122d0-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bbc122d0-3d0d-11ee-ba1f-812391e2855d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4b8aaaf1fbacad50064c70a8b09a3da20b48cd5 --- /dev/null +++ b/graph/incidents_graphml/b/bbc122d0-3d0d-11ee-ba1f-812391e2855d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.28 + 100.64.66.28 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283969 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bbc122d0-3d0d-11ee-ba1f-812391e2855d + + + diff --git a/graph/incidents_graphml/b/bbc328b0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bbc328b0-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..940ad1ecf164885527d782b9cf4bb4de87c3e6cd --- /dev/null +++ b/graph/incidents_graphml/b/bbc328b0-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.233 + 100.64.80.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.178 + 100.64.72.178 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.190 + 100.64.72.190 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659940288 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbc328b0-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940288 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbc328b0-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940288 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbc328b0-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940288 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbc328b0-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/b/bbc36ee0-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bbc36ee0-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46a2d048e825d48e55589b59388c7b3fa0674d72 --- /dev/null +++ b/graph/incidents_graphml/b/bbc36ee0-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.117 + USER-0015-1185.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616496 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bbc36ee0-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/bbcf7370-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bbcf7370-258f-11ee-aa0d-9950110e3974.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbda33bab01577ce356b927741d868e463337c32 --- /dev/null +++ b/graph/incidents_graphml/b/bbcf7370-258f-11ee-aa0d-9950110e3974.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.41 + 100.64.25.41 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689700975 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bbcf7370-258f-11ee-aa0d-9950110e3974 + + + diff --git a/graph/incidents_graphml/b/bbdfa970-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bbdfa970-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6b50e5b1ae01581e0ca6ae200cba2e07fad9728 --- /dev/null +++ b/graph/incidents_graphml/b/bbdfa970-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.117 + USER-0015-1185.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616496 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bbdfa970-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/bbece3e0-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/b/bbece3e0-2b35-11ef-be20-e314b24e9951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6ac1e7ca388ebae59524d2c71cd1519da115428 --- /dev/null +++ b/graph/incidents_graphml/b/bbece3e0-2b35-11ef-be20-e314b24e9951.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.227 + USER-0015-2072.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.82 + 100.64.86.82 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.46.208 + 172.16.46.208 + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.228 + 100.64.91.228 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.131 + USER-0015-2073.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.229 + 100.64.91.229 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.230 + 100.64.91.230 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.133 + USER-0015-1997.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.176 + USER-0015-2074.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.231 + USER-0015-2075.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.232 + 100.64.91.232 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.233 + USER-0015-2076.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469525 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bbece3e0-2b35-11ef-be20-e314b24e9951 + + + diff --git a/graph/incidents_graphml/b/bbf55230-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bbf55230-3d0d-11ee-ba1f-812391e2855d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d46d6fe652dfb0376d9743ed48990daf63ea27f1 --- /dev/null +++ b/graph/incidents_graphml/b/bbf55230-3d0d-11ee-ba1f-812391e2855d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.28 + 100.64.66.28 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283969 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bbf55230-3d0d-11ee-ba1f-812391e2855d + + + diff --git a/graph/incidents_graphml/b/bbfb4760-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/b/bbfb4760-056f-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abd2ca6d176f093a0cadf56ec5039e5bb8855860 --- /dev/null +++ b/graph/incidents_graphml/b/bbfb4760-056f-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.74 + 100.64.30.74 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.161 + 100.64.72.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1686168794 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bbfb4760-056f-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686168794 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bbfb4760-056f-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/b/bbfc5930-1bb2-11ee-9d11-dd09cc4c3aca.graphml b/graph/incidents_graphml/b/bbfc5930-1bb2-11ee-9d11-dd09cc4c3aca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f824b520d11b9c1adf5922565aa6eb3492df598 --- /dev/null +++ b/graph/incidents_graphml/b/bbfc5930-1bb2-11ee-9d11-dd09cc4c3aca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.119 + 100.64.7.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688616496 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bbfc5930-1bb2-11ee-9d11-dd09cc4c3aca + + + diff --git a/graph/incidents_graphml/b/bc0039d0-9e14-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/b/bc0039d0-9e14-11ee-a5ab-8550688be6fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..164f526b47debeab97bc87f3814801f26d6d2cd7 --- /dev/null +++ b/graph/incidents_graphml/b/bc0039d0-9e14-11ee-a5ab-8550688be6fd.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.49 + 100.64.23.49 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.36.70 + USER-0015-1535.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1702952238 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc0039d0-9e14-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952238 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc0039d0-9e14-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952238 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc0039d0-9e14-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952238 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc0039d0-9e14-11ee-a5ab-8550688be6fd + + + diff --git a/graph/incidents_graphml/b/bc046650-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bc046650-d30b-11ee-ab07-630a66777c1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b88162bb936a6dc5a51f3a86a874a20f73470d8 --- /dev/null +++ b/graph/incidents_graphml/b/bc046650-d30b-11ee-ab07-630a66777c1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.83 + 100.64.33.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708775784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc046650-d30b-11ee-ab07-630a66777c1a + + + diff --git a/graph/incidents_graphml/b/bc0c62d0-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bc0c62d0-6400-11ee-a904-77b5e02bdb5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15fb0694690d6351c08837b0f4f4153d807f54df --- /dev/null +++ b/graph/incidents_graphml/b/bc0c62d0-6400-11ee-a904-77b5e02bdb5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.20 + 100.64.23.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696566481 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc0c62d0-6400-11ee-a904-77b5e02bdb5f + + + diff --git a/graph/incidents_graphml/b/bc0d21b0-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/b/bc0d21b0-056f-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b32e54852e499e3a9e873ebf4b23a2567d866db5 --- /dev/null +++ b/graph/incidents_graphml/b/bc0d21b0-056f-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.71.80 + 100.64.71.80 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1686168795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc0d21b0-056f-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686168795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc0d21b0-056f-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/b/bc0d89e0-3249-11ef-8034-87bdea2d948c.graphml b/graph/incidents_graphml/b/bc0d89e0-3249-11ef-8034-87bdea2d948c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1acc5247dff6e3a9460270d2718c0258009645c --- /dev/null +++ b/graph/incidents_graphml/b/bc0d89e0-3249-11ef-8034-87bdea2d948c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.134.199 + 192.168.134.199 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.122 + 100.64.96.122 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719247774 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc0d89e0-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247774 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc0d89e0-3249-11ef-8034-87bdea2d948c + + + diff --git a/graph/incidents_graphml/b/bc10f080-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bc10f080-3d0d-11ee-ba1f-812391e2855d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..432f43b6bfa8a8d0a20dd8611f63a65c90d6d2a9 --- /dev/null +++ b/graph/incidents_graphml/b/bc10f080-3d0d-11ee-ba1f-812391e2855d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.76 + 100.64.50.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283969 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc10f080-3d0d-11ee-ba1f-812391e2855d + + + diff --git a/graph/incidents_graphml/b/bc1492f0-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/b/bc1492f0-d30b-11ee-ab07-630a66777c1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4750de29113d73c5f876e19383e45ddad846624e --- /dev/null +++ b/graph/incidents_graphml/b/bc1492f0-d30b-11ee-ab07-630a66777c1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.83 + 100.64.33.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708775784 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc1492f0-d30b-11ee-ab07-630a66777c1a + + + diff --git a/graph/incidents_graphml/b/bc1874a0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bc1874a0-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f822632bd2aa4ce4ca22fdc9be7f41562582c94 --- /dev/null +++ b/graph/incidents_graphml/b/bc1874a0-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.182 + 100.64.76.182 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.71 + 100.64.73.71 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659940288 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc1874a0-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940288 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc1874a0-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/b/bc1c1320-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/b/bc1c1320-1c97-11ee-b9c1-8f183b2e0424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8372133311398180d8bcc45ca6bc19d964e087b3 --- /dev/null +++ b/graph/incidents_graphml/b/bc1c1320-1c97-11ee-b9c1-8f183b2e0424.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.230 + 100.64.76.230 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.48.214 + 100.64.48.214 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688714851 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc1c1320-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714851 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc1c1320-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714851 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc1c1320-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714851 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc1c1320-1c97-11ee-b9c1-8f183b2e0424 + + + diff --git a/graph/incidents_graphml/b/bc1f0070-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bc1f0070-6400-11ee-a904-77b5e02bdb5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1988d9d832a7a281564b3bf20ed3d17f3b526cac --- /dev/null +++ b/graph/incidents_graphml/b/bc1f0070-6400-11ee-a904-77b5e02bdb5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.20 + 100.64.23.20 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696566481 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc1f0070-6400-11ee-a904-77b5e02bdb5f + + + diff --git a/graph/incidents_graphml/b/bc237ae0-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/b/bc237ae0-45d0-11ee-95ea-81d84bb304b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53feef73d3378e433930e216d903147785a7221b --- /dev/null +++ b/graph/incidents_graphml/b/bc237ae0-45d0-11ee-95ea-81d84bb304b3.graphml @@ -0,0 +1,581 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.163 + 100.64.69.163 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.34.1 + 100.64.34.1 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.164 + 100.64.69.164 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.23.29 + 100.64.23.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.165 + USER-0015-1528.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.166 + 100.64.69.166 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.45.239 + 100.64.45.239 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.167 + 100.64.69.167 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247330 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc237ae0-45d0-11ee-95ea-81d84bb304b3 + + + diff --git a/graph/incidents_graphml/b/bc2c46e0-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bc2c46e0-6400-11ee-a904-77b5e02bdb5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..849845c0d0f5945df6874460b0b0aace6ef3d9e2 --- /dev/null +++ b/graph/incidents_graphml/b/bc2c46e0-6400-11ee-a904-77b5e02bdb5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.162 + 100.64.35.162 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696566481 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc2c46e0-6400-11ee-a904-77b5e02bdb5f + + + diff --git a/graph/incidents_graphml/b/bc2e3b90-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/b/bc2e3b90-1c97-11ee-b9c1-8f183b2e0424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cee27734608560f452268c270a134ceb5d35df7c --- /dev/null +++ b/graph/incidents_graphml/b/bc2e3b90-1c97-11ee-b9c1-8f183b2e0424.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.231 + 100.64.76.231 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 192.168.87.65 + 192.168.87.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.232 + 100.64.76.232 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688714851 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc2e3b90-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714851 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc2e3b90-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714851 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc2e3b90-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714851 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc2e3b90-1c97-11ee-b9c1-8f183b2e0424 + + + diff --git a/graph/incidents_graphml/b/bc3126e0-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bc3126e0-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43ce304d5735e3e5c09903b113b035ae496452fc --- /dev/null +++ b/graph/incidents_graphml/b/bc3126e0-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.249 + 100.64.54.249 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844365 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc3126e0-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/bc3a50a0-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bc3a50a0-6400-11ee-a904-77b5e02bdb5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db8b8f32b25362db7b744ca0098393a6fc1891bc --- /dev/null +++ b/graph/incidents_graphml/b/bc3a50a0-6400-11ee-a904-77b5e02bdb5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.162 + 100.64.35.162 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696566481 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc3a50a0-6400-11ee-a904-77b5e02bdb5f + + + diff --git a/graph/incidents_graphml/b/bc3fa5d0-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bc3fa5d0-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f524c890a54a3e19ad682df12a4275282341bb45 --- /dev/null +++ b/graph/incidents_graphml/b/bc3fa5d0-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.249 + 100.64.54.249 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844366 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc3fa5d0-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/bc4cec40-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bc4cec40-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..beb43e09f883e063e27a0d386cf377b3ef2b770e --- /dev/null +++ b/graph/incidents_graphml/b/bc4cec40-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.47 + 100.64.8.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844366 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc4cec40-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/bc595c30-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/bc595c30-11c0-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3c75097f6bb1d5d8d012d4bbf9f96c697deed0d --- /dev/null +++ b/graph/incidents_graphml/b/bc595c30-11c0-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.69.182 + 100.64.69.182 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687522998 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc595c30-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522998 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc595c30-11c0-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/b/bc5af540-6fb7-11ee-9cc4-3d6958431eea.graphml b/graph/incidents_graphml/b/bc5af540-6fb7-11ee-9cc4-3d6958431eea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b21d93eaf009ec9a273430192382f97f2eb090c9 --- /dev/null +++ b/graph/incidents_graphml/b/bc5af540-6fb7-11ee-9cc4-3d6958431eea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.165 + 100.64.10.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697854542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc5af540-6fb7-11ee-9cc4-3d6958431eea + + + diff --git a/graph/incidents_graphml/b/bc5af600-6687-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/b/bc5af600-6687-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d590f5bd38192448f7ea2d2a1f0a850050852d3a --- /dev/null +++ b/graph/incidents_graphml/b/bc5af600-6687-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.47 + 100.64.8.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696844366 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc5af600-6687-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/b/bc629080-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bc629080-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0697296e6023169f30342fd5d2418312a180ba16 --- /dev/null +++ b/graph/incidents_graphml/b/bc629080-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.90.12 + 100.64.90.12 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697446091 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bc629080-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/b/bc6ada60-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bc6ada60-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2442ed0d231f9c15b79d1571bfbaac377204cb04 --- /dev/null +++ b/graph/incidents_graphml/b/bc6ada60-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.115 + 100.64.68.115 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.158 + USER-0015-1647.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659940289 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc6ada60-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940289 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc6ada60-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/b/bc745e40-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/b/bc745e40-11c0-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..880030eb4019619e9e74a3d0405bc64fe4f573b7 --- /dev/null +++ b/graph/incidents_graphml/b/bc745e40-11c0-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.83 + 100.64.17.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.245 + 100.64.76.245 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687522999 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc745e40-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687522999 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bc745e40-11c0-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/b/bc81cdc0-ab79-11ee-a1cb-599f1b15ded5.graphml b/graph/incidents_graphml/b/bc81cdc0-ab79-11ee-a1cb-599f1b15ded5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fff6360d8e5e45faca19f7d1b499496ea66ea660 --- /dev/null +++ b/graph/incidents_graphml/b/bc81cdc0-ab79-11ee-a1cb-599f1b15ded5.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.166 + 100.64.22.166 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704424983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc81cdc0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc81cdc0-ab79-11ee-a1cb-599f1b15ded5 + + + diff --git a/graph/incidents_graphml/b/bc962010-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/b/bc962010-311a-11ee-87a2-613e036775fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e69d77929405b622fbf7e00e7d8df8c9d3f4e2f4 --- /dev/null +++ b/graph/incidents_graphml/b/bc962010-311a-11ee-87a2-613e036775fd.graphml @@ -0,0 +1,279 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.98 + 100.64.21.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.56 + 100.64.58.56 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.57 + 100.64.58.57 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.184 + 100.64.34.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.58 + 100.64.58.58 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.152 + 100.64.9.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.59 + 100.64.58.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bc962010-311a-11ee-87a2-613e036775fd + + + diff --git a/graph/incidents_graphml/b/bca22db0-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/b/bca22db0-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6fb051445e2bfa6793b3fc4ffb17fc687df79dc --- /dev/null +++ b/graph/incidents_graphml/b/bca22db0-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.60 + 100.64.24.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bca22db0-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/b/bca324e0-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/b/bca324e0-f9fb-11ee-a91e-b385ff48b568.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a9c579be48eb0adba8f18e4cd2d537fea9a84df --- /dev/null +++ b/graph/incidents_graphml/b/bca324e0-f9fb-11ee-a91e-b385ff48b568.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.249 + 100.64.27.249 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1713057009 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bca324e0-f9fb-11ee-a91e-b385ff48b568 + + + diff --git a/graph/incidents_graphml/b/bca54770-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bca54770-6400-11ee-a904-77b5e02bdb5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76072cd7237afce2ec7d5eb674cda55b5eaf38f3 --- /dev/null +++ b/graph/incidents_graphml/b/bca54770-6400-11ee-a904-77b5e02bdb5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.164 + 100.64.35.164 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696566482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bca54770-6400-11ee-a904-77b5e02bdb5f + + + diff --git a/graph/incidents_graphml/b/bca980e0-bb01-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/b/bca980e0-bb01-11ed-9416-c54055a72e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc5f84994cf8df181f899566a734c64b68b1d1e6 --- /dev/null +++ b/graph/incidents_graphml/b/bca980e0-bb01-11ed-9416-c54055a72e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.71 + 100.64.71.71 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.58 + 100.64.1.58 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + INCIDENT_LINK + 1677985165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bca980e0-bb01-11ed-9416-c54055a72e53 + + + diff --git a/graph/incidents_graphml/b/bcb1e520-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/b/bcb1e520-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..759910c8f961c266b902ad71866bf46771c2c125 --- /dev/null +++ b/graph/incidents_graphml/b/bcb1e520-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.60 + 100.64.24.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175675 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bcb1e520-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/b/bcb7e510-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bcb7e510-6400-11ee-a904-77b5e02bdb5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..950c4e9338ffd352fccedd783182ab85c94c1ed4 --- /dev/null +++ b/graph/incidents_graphml/b/bcb7e510-6400-11ee-a904-77b5e02bdb5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.164 + 100.64.35.164 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696566482 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bcb7e510-6400-11ee-a904-77b5e02bdb5f + + + diff --git a/graph/incidents_graphml/b/bcbce0b0-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bcbce0b0-258f-11ee-aa0d-9950110e3974.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0702b5fa036cbd1d45bc3ed6af6a5a7f83f9dc51 --- /dev/null +++ b/graph/incidents_graphml/b/bcbce0b0-258f-11ee-aa0d-9950110e3974.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.43 + 100.64.25.43 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689700977 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bcbce0b0-258f-11ee-aa0d-9950110e3974 + + + diff --git a/graph/incidents_graphml/b/bcc77570-6400-11ee-a904-77b5e02bdb5f.graphml b/graph/incidents_graphml/b/bcc77570-6400-11ee-a904-77b5e02bdb5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8cd817041bf2daee222dc7f056f4437f8b505c34 --- /dev/null +++ b/graph/incidents_graphml/b/bcc77570-6400-11ee-a904-77b5e02bdb5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.53 + 100.64.34.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696566482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcc77570-6400-11ee-a904-77b5e02bdb5f + + + diff --git a/graph/incidents_graphml/b/bcd24ec0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bcd24ec0-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff906779bbc1526b0d11c83ce26cbdc7787490a0 --- /dev/null +++ b/graph/incidents_graphml/b/bcd24ec0-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.82 + 100.64.79.82 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.249 + 100.64.73.249 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659940289 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bcd24ec0-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940289 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bcd24ec0-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/b/bcdb1710-258f-11ee-aa0d-9950110e3974.graphml b/graph/incidents_graphml/b/bcdb1710-258f-11ee-aa0d-9950110e3974.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55463e4e50383f464da7b4bc354ef33d0e81ae18 --- /dev/null +++ b/graph/incidents_graphml/b/bcdb1710-258f-11ee-aa0d-9950110e3974.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.45 + 100.64.25.45 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689700977 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcdb1710-258f-11ee-aa0d-9950110e3974 + + + diff --git a/graph/incidents_graphml/b/bcdde780-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bcdde780-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dadc983b9bd7158e482f23d5216db820fd98a741 --- /dev/null +++ b/graph/incidents_graphml/b/bcdde780-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.234 + 100.64.80.234 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659940290 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bcdde780-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940290 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bcdde780-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/b/bcea4b00-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/b/bcea4b00-3150-11ee-9a81-45e5b946e7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93db4d3583271e423abe2cbabb2e4693336b9f20 --- /dev/null +++ b/graph/incidents_graphml/b/bcea4b00-3150-11ee-9a81-45e5b946e7a5.graphml @@ -0,0 +1,785 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.148 + 100.64.9.148 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.150 + 100.64.9.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.151 + 100.64.9.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.152 + 100.64.9.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.153 + 100.64.9.153 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.154 + 100.64.9.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.155 + 100.64.9.155 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.157 + 100.64.9.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.249 + USER-0015-1191.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.158 + 100.64.9.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.159 + 100.64.9.159 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.160 + 100.64.9.160 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.161 + 100.64.9.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.162 + 100.64.9.162 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.163 + 100.64.9.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcea4b00-3150-11ee-9a81-45e5b946e7a5 + + + diff --git a/graph/incidents_graphml/b/bcfa12a0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bcfa12a0-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b628727d5a3a387f5744d6302f4edcae43dacdeb --- /dev/null +++ b/graph/incidents_graphml/b/bcfa12a0-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.106 + 100.64.17.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812681 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bcfa12a0-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/b/bcfa28e0-f766-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/b/bcfa28e0-f766-11ee-a32a-474576cc2660.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae237d7c930eda43f0d3b8536ee90e06e2cc035d --- /dev/null +++ b/graph/incidents_graphml/b/bcfa28e0-f766-11ee-a32a-474576cc2660.graphml @@ -0,0 +1,573 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.44 + 100.64.10.44 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.70.119 + 100.64.70.119 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.17.69 + 100.64.17.69 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.120 + 100.64.70.120 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.91 + 100.64.68.91 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.121 + 100.64.70.121 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.70.122 + 100.64.70.122 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.14.83 + USER-0015-1534.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.22.24 + 100.64.22.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.37.113 + 100.64.37.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bcfa28e0-f766-11ee-a32a-474576cc2660 + + + diff --git a/graph/incidents_graphml/b/bd04ec70-ece0-11ee-ac0b-e5fde63aeb72.graphml b/graph/incidents_graphml/b/bd04ec70-ece0-11ee-ac0b-e5fde63aeb72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fba2414e5fec8cd094005df7f40a317fbca6d83f --- /dev/null +++ b/graph/incidents_graphml/b/bd04ec70-ece0-11ee-ac0b-e5fde63aeb72.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.103 + 100.64.18.103 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.12.136 + 100.64.12.136 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711616048 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd04ec70-ece0-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711616048 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd04ec70-ece0-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711616048 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd04ec70-ece0-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711616048 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd04ec70-ece0-11ee-ac0b-e5fde63aeb72 + + + diff --git a/graph/incidents_graphml/b/bd05b770-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/b/bd05b770-95ae-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe7e9314c3735aeffd361208fb712ae7a1868589 --- /dev/null +++ b/graph/incidents_graphml/b/bd05b770-95ae-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.18 + 100.64.6.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1673881324 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd05b770-95ae-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673881324 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd05b770-95ae-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/b/bd08f910-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/b/bd08f910-5bee-11ee-82a0-9da780b0dcc4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c2e2cb1b654777b24b444bbce214920c57d19bc --- /dev/null +++ b/graph/incidents_graphml/b/bd08f910-5bee-11ee-82a0-9da780b0dcc4.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.225 + 100.64.22.225 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695679142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bd08f910-5bee-11ee-82a0-9da780b0dcc4 + + + INCIDENT_LINK + 1695679142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bd08f910-5bee-11ee-82a0-9da780b0dcc4 + + + diff --git a/graph/incidents_graphml/b/bd0be010-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bd0be010-2d5b-11ee-9400-61c78ce5335d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65ba48daa2de99ed547c784b22a1576facc14d2f --- /dev/null +++ b/graph/incidents_graphml/b/bd0be010-2d5b-11ee-9400-61c78ce5335d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690558253 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd0be010-2d5b-11ee-9400-61c78ce5335d + + + diff --git a/graph/incidents_graphml/b/bd0de3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bd0de3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0494f29c9fe3846d8ed573790e7eb2347e6d92b5 --- /dev/null +++ b/graph/incidents_graphml/b/bd0de3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.14 + 100.64.36.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788893 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd0de3e0-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/b/bd0f1e40-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bd0f1e40-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c77bb06bd7d17323925cc8edfb5c2b587a13cf6d --- /dev/null +++ b/graph/incidents_graphml/b/bd0f1e40-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.203 + 100.64.10.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826855 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd0f1e40-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/b/bd10b0b0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/b/bd10b0b0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..176e8012439033d1cd5a0ec8a74f32a66b2d2df5 --- /dev/null +++ b/graph/incidents_graphml/b/bd10b0b0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.43 + 100.64.17.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708860397 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd10b0b0-d3d0-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/b/bd247640-15a3-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/b/bd247640-15a3-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82f17466ebec495099096e21bdc22b010e6c34bb --- /dev/null +++ b/graph/incidents_graphml/b/bd247640-15a3-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.109 + 100.64.23.109 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.50.99 + 100.64.50.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687950349 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd247640-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950349 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd247640-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950349 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd247640-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950349 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd247640-15a3-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/b/bd2d71d0-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bd2d71d0-2d5b-11ee-9400-61c78ce5335d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8bd204cf2cddc0766ceb73ce6eb5d9a4c84c1cbb --- /dev/null +++ b/graph/incidents_graphml/b/bd2d71d0-2d5b-11ee-9400-61c78ce5335d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690558253 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd2d71d0-2d5b-11ee-9400-61c78ce5335d + + + diff --git a/graph/incidents_graphml/b/bd31faf0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bd31faf0-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03b508ae2b5b443dab808ef941862c6c200c8070 --- /dev/null +++ b/graph/incidents_graphml/b/bd31faf0-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.235 + 100.64.80.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.185 + 100.64.73.185 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659940290 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd31faf0-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940290 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd31faf0-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/b/bd34f3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bd34f3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99e93c636a7260ed533ca73051de9fe0fa58e155 --- /dev/null +++ b/graph/incidents_graphml/b/bd34f3e0-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.14 + 100.64.36.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788893 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd34f3e0-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/b/bd385180-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/bd385180-2ebf-11ee-9131-1117bdeaaaa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83d12050f595bfeaeb682bf1ca4dd2f14298ee56 --- /dev/null +++ b/graph/incidents_graphml/b/bd385180-2ebf-11ee-9131-1117bdeaaaa3.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.114 + 100.64.72.114 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.1 + 100.64.10.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.11.47 + 100.64.11.47 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690711154 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd385180-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711154 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd385180-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711154 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd385180-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711154 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd385180-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711154 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd385180-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711154 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd385180-2ebf-11ee-9131-1117bdeaaaa3 + + + diff --git a/graph/incidents_graphml/b/bd3e9920-0be4-11ef-ba5f-4140e81db4cb.graphml b/graph/incidents_graphml/b/bd3e9920-0be4-11ef-ba5f-4140e81db4cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20b651bfe890e0d984d838a87f5433dfdcea8cf3 --- /dev/null +++ b/graph/incidents_graphml/b/bd3e9920-0be4-11ef-ba5f-4140e81db4cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.225 + USER-0015-2053.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1715026252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd3e9920-0be4-11ef-ba5f-4140e81db4cb + + + diff --git a/graph/incidents_graphml/b/bd49e660-6093-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/b/bd49e660-6093-11ee-a31b-270f2d0ccd3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eac483d4189d3112860a3daeada406d1ecf08930 --- /dev/null +++ b/graph/incidents_graphml/b/bd49e660-6093-11ee-a31b-270f2d0ccd3d.graphml @@ -0,0 +1,589 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.27 + 100.64.69.27 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.11.113 + 100.64.11.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.12.29 + 100.64.12.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.29.35 + 100.64.29.35 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.25.125 + 100.64.25.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.32.161 + 100.64.32.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.28 + 100.64.69.28 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.17.226 + 100.64.17.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd49e660-6093-11ee-a31b-270f2d0ccd3d + + + diff --git a/graph/incidents_graphml/b/bd4ac630-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/b/bd4ac630-2b35-11ef-be20-e314b24e9951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..225ba46437fea34645865fb10cd1ef468443b5a5 --- /dev/null +++ b/graph/incidents_graphml/b/bd4ac630-2b35-11ef-be20-e314b24e9951.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.88.186.68 + 10.88.186.68 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.104.209 + USER-0015-2077.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718469528 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd4ac630-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469528 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd4ac630-2b35-11ef-be20-e314b24e9951 + + + diff --git a/graph/incidents_graphml/b/bd4ac850-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/b/bd4ac850-26cd-11ee-863d-83828757c718.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7df4b6221449b39fb739a96c243f62f38f9d53fb --- /dev/null +++ b/graph/incidents_graphml/b/bd4ac850-26cd-11ee-863d-83828757c718.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.72 + 100.64.25.72 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.162 + 100.64.49.162 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689837558 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd4ac850-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd4ac850-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd4ac850-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd4ac850-26cd-11ee-863d-83828757c718 + + + diff --git a/graph/incidents_graphml/b/bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..482b1a283922d74cc640e517dbbcb3de2862193f --- /dev/null +++ b/graph/incidents_graphml/b/bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.186 + 100.64.57.186 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788893 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3 + + + INCIDENT_LINK + 1690788893 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd4e6f50-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/b/bd5c9840-3f5b-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/b/bd5c9840-3f5b-11ee-a7a8-a9c952ce7042.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51a4de69afe25a87aea8f6736c939ae7deb55d02 --- /dev/null +++ b/graph/incidents_graphml/b/bd5c9840-3f5b-11ee-a7a8-a9c952ce7042.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.242 + 100.64.69.242 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.243 + 100.64.69.243 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692537374 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd5c9840-3f5b-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537374 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd5c9840-3f5b-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537374 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd5c9840-3f5b-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537374 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd5c9840-3f5b-11ee-a7a8-a9c952ce7042 + + + diff --git a/graph/incidents_graphml/b/bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/b/bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0b7eacc7014eee1e916f175b5e5f044db6d4340 --- /dev/null +++ b/graph/incidents_graphml/b/bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.217 + 100.64.75.217 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.141 + 100.64.71.141 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660528271 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528271 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd64d1b0-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/b/bd677810-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/b/bd677810-26cd-11ee-863d-83828757c718.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18457825b1dda5416b31dc4b1296c78ffcef37d0 --- /dev/null +++ b/graph/incidents_graphml/b/bd677810-26cd-11ee-863d-83828757c718.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.164 + 100.64.49.164 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.90 + 100.64.31.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd677810-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd677810-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd677810-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd677810-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd677810-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd677810-26cd-11ee-863d-83828757c718 + + + diff --git a/graph/incidents_graphml/b/bd67b330-b9c1-11ed-bac8-570c4bb8b980.graphml b/graph/incidents_graphml/b/bd67b330-b9c1-11ed-bac8-570c4bb8b980.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d5cc73dcd6cb8d94ef667bdfd7714039abe4008 --- /dev/null +++ b/graph/incidents_graphml/b/bd67b330-b9c1-11ed-bac8-570c4bb8b980.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.171 + 100.64.84.171 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677847727 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd67b330-b9c1-11ed-bac8-570c4bb8b980 + + + diff --git a/graph/incidents_graphml/b/bd6a14d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/bd6a14d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ff18356c21708e00bd1aaf115e0626cddc20655 --- /dev/null +++ b/graph/incidents_graphml/b/bd6a14d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.193 + 100.64.16.193 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951582 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd6a14d0-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/bd6a6600-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bd6a6600-3d0d-11ee-ba1f-812391e2855d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b53210aa8e4922ef4d540870b97e20c951e16e8e --- /dev/null +++ b/graph/incidents_graphml/b/bd6a6600-3d0d-11ee-ba1f-812391e2855d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.31 + 100.64.15.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283971 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bd6a6600-3d0d-11ee-ba1f-812391e2855d + + + diff --git a/graph/incidents_graphml/b/bd6e7a70-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bd6e7a70-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..171162aff7e088e4481a9657b6bef317d8e099f5 --- /dev/null +++ b/graph/incidents_graphml/b/bd6e7a70-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.186 + 100.64.57.186 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788893 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bd6e7a70-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/b/bd786cb0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/bd786cb0-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3259c1264e1dc419df082b2426678d18cbb98c80 --- /dev/null +++ b/graph/incidents_graphml/b/bd786cb0-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.193 + 100.64.16.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951583 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd786cb0-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/bd7cbc00-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/b/bd7cbc00-f9fb-11ee-a91e-b385ff48b568.graphml new file mode 100644 index 0000000000000000000000000000000000000000..113f367080c941c7b794ed94b73a5516eab2de88 --- /dev/null +++ b/graph/incidents_graphml/b/bd7cbc00-f9fb-11ee-a91e-b385ff48b568.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.11 + 100.64.2.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713057010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd7cbc00-f9fb-11ee-a91e-b385ff48b568 + + + diff --git a/graph/incidents_graphml/b/bd7eed30-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bd7eed30-2d5b-11ee-9400-61c78ce5335d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af9b5dda22f33b3061e9941f8b8c74c81151dd92 --- /dev/null +++ b/graph/incidents_graphml/b/bd7eed30-2d5b-11ee-9400-61c78ce5335d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.123 + 100.64.40.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690558254 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd7eed30-2d5b-11ee-9400-61c78ce5335d + + + diff --git a/graph/incidents_graphml/b/bd7f6ce0-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/b/bd7f6ce0-26cd-11ee-863d-83828757c718.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac44c21f5052f5a5435f666623eda8d67739d433 --- /dev/null +++ b/graph/incidents_graphml/b/bd7f6ce0-26cd-11ee-863d-83828757c718.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.167 + 100.64.10.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.166 + 100.64.49.166 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.87 + 100.64.25.87 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.167 + 100.64.49.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.168 + 100.64.49.168 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837558 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd7f6ce0-26cd-11ee-863d-83828757c718 + + + diff --git a/graph/incidents_graphml/b/bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/b/bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b183c2298e08e0442bd48f98a627b2b4517df921 --- /dev/null +++ b/graph/incidents_graphml/b/bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f.graphml @@ -0,0 +1,575 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.120 + 100.64.48.120 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.136 + 100.64.20.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.72 + 100.64.52.72 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.73 + 100.64.52.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.74 + 100.64.52.74 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.75 + 100.64.52.75 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.76 + 100.64.52.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.109 + 100.64.29.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.77 + 100.64.52.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.176 + 100.64.24.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.78 + 100.64.52.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.76 + 100.64.15.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.182 + 100.64.27.182 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd8447b0-cf6a-11ee-91bc-e1cf8103bf6f + + + diff --git a/graph/incidents_graphml/b/bd950270-09b3-11ef-9ef0-737536dee9f3.graphml b/graph/incidents_graphml/b/bd950270-09b3-11ef-9ef0-737536dee9f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17cb94f9c94d9acb9c85037b19cff67e743aa46d --- /dev/null +++ b/graph/incidents_graphml/b/bd950270-09b3-11ef-9ef0-737536dee9f3.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.12 + 100.64.2.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.82 + 100.64.64.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.87 + 100.64.26.87 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.151 + 100.64.41.151 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.73 + 100.64.26.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bd950270-09b3-11ef-9ef0-737536dee9f3 + + + diff --git a/graph/incidents_graphml/b/bd993da0-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/b/bd993da0-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ea18899e1066e427a1a3775c759376e52a8397d --- /dev/null +++ b/graph/incidents_graphml/b/bd993da0-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.34 + 100.64.53.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bd993da0-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/b/bd9b1970-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/b/bd9b1970-f9fb-11ee-a91e-b385ff48b568.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af4c79bff520048aba0b1d1f370d288cb99eddfe --- /dev/null +++ b/graph/incidents_graphml/b/bd9b1970-f9fb-11ee-a91e-b385ff48b568.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.11 + 100.64.2.11 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1713057010 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bd9b1970-f9fb-11ee-a91e-b385ff48b568 + + + diff --git a/graph/incidents_graphml/b/bda28a90-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bda28a90-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01bdbf9d09d2cdf98d65299f59b5401bed79fd1e --- /dev/null +++ b/graph/incidents_graphml/b/bda28a90-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.14 + 100.64.90.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1697446093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bda28a90-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/b/bda914a0-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bda914a0-3e29-11ee-b681-89e3497f1d7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b301199a12870651dafb8c3d824321ca4331c04 --- /dev/null +++ b/graph/incidents_graphml/b/bda914a0-3e29-11ee-b681-89e3497f1d7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.118 + 100.64.15.118 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692405949 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bda914a0-3e29-11ee-b681-89e3497f1d7e + + +