f15hb0wn commited on
Commit
f33cbd9
·
verified ·
1 Parent(s): e91064b

Upload per-incident GraphML sharded batch 22/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/c/cf276970-131d-11ee-8854-7b8acd154f2f.graphml +63 -0
  2. graph/incidents_graphml/c/cf283820-10d6-11ef-8c06-93e20871a0e5.graphml +63 -0
  3. graph/incidents_graphml/c/cf3394f0-5b8b-11ee-9925-ebc6745d6541.graphml +63 -0
  4. graph/incidents_graphml/c/cf394f20-10d6-11ef-8c06-93e20871a0e5.graphml +63 -0
  5. graph/incidents_graphml/c/cf3a3800-5fe6-11ee-80e7-7732713cc006.graphml +63 -0
  6. graph/incidents_graphml/c/cf422d90-2dc6-11ef-976a-4f91a87d18f6.graphml +63 -0
  7. graph/incidents_graphml/c/cf468a30-131d-11ee-8854-7b8acd154f2f.graphml +63 -0
  8. graph/incidents_graphml/c/cf4966e0-5b8b-11ee-9925-ebc6745d6541.graphml +63 -0
  9. graph/incidents_graphml/c/cf49b720-7e8c-11ee-b44e-cd55abd836ec.graphml +63 -0
  10. graph/incidents_graphml/c/cf4cfcb0-5fe6-11ee-80e7-7732713cc006.graphml +63 -0
  11. graph/incidents_graphml/c/cf5bf720-2dc6-11ef-976a-4f91a87d18f6.graphml +63 -0
  12. graph/incidents_graphml/c/cf5c3ef0-5fe6-11ee-80e7-7732713cc006.graphml +63 -0
  13. graph/incidents_graphml/c/cf5d8cc0-92f9-11ed-844e-b1b9f26efb97.graphml +63 -0
  14. graph/incidents_graphml/c/cf5db450-7e8c-11ee-b44e-cd55abd836ec.graphml +63 -0
  15. graph/incidents_graphml/c/cf5f4250-131d-11ee-8854-7b8acd154f2f.graphml +63 -0
  16. graph/incidents_graphml/c/cf613cd0-89bb-11ee-bba1-ef6459fc1a52.graphml +63 -0
  17. graph/incidents_graphml/c/cf624610-5b8b-11ee-9925-ebc6745d6541.graphml +63 -0
  18. graph/incidents_graphml/c/cf62ac80-4ceb-11ee-b223-133fe64c82b5.graphml +793 -0
  19. graph/incidents_graphml/c/cf62e3f0-92f9-11ed-844e-b1b9f26efb97.graphml +63 -0
  20. graph/incidents_graphml/c/cf69d380-5fe6-11ee-80e7-7732713cc006.graphml +63 -0
  21. graph/incidents_graphml/c/cf69e8d0-92f9-11ed-844e-b1b9f26efb97.graphml +63 -0
  22. graph/incidents_graphml/c/cf6a7c90-f84f-11ec-8cad-d3b902a073da.graphml +63 -0
  23. graph/incidents_graphml/c/cf6c3340-7e8c-11ee-b44e-cd55abd836ec.graphml +63 -0
  24. graph/incidents_graphml/c/cf6fdc40-92f9-11ed-844e-b1b9f26efb97.graphml +63 -0
  25. graph/incidents_graphml/c/cf722cc0-89bb-11ee-bba1-ef6459fc1a52.graphml +63 -0
  26. graph/incidents_graphml/c/cf787980-5fe6-11ee-80e7-7732713cc006.graphml +63 -0
  27. graph/incidents_graphml/c/cf798fe0-4ceb-11ee-b223-133fe64c82b5.graphml +63 -0
  28. graph/incidents_graphml/c/cf7a0d20-4423-11ed-8338-1b551ccaa997.graphml +63 -0
  29. graph/incidents_graphml/c/cf7bc3a0-7e8c-11ee-b44e-cd55abd836ec.graphml +63 -0
  30. graph/incidents_graphml/c/cf80a970-4af6-11ee-adcb-67c31ebac50c.graphml +63 -0
  31. graph/incidents_graphml/c/cf80ad00-131d-11ee-8854-7b8acd154f2f.graphml +63 -0
  32. graph/incidents_graphml/c/cf82a780-89bb-11ee-bba1-ef6459fc1a52.graphml +63 -0
  33. graph/incidents_graphml/c/cf848bc0-2ff4-11ee-b00f-c1ca007fb916.graphml +185 -0
  34. graph/incidents_graphml/c/cf8a1b80-7e8c-11ee-b44e-cd55abd836ec.graphml +63 -0
  35. graph/incidents_graphml/c/cf8eb330-4af6-11ee-adcb-67c31ebac50c.graphml +63 -0
  36. graph/incidents_graphml/c/cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b.graphml +293 -0
  37. graph/incidents_graphml/c/cf9302c0-2d17-11ee-92ce-ad047e277e2c.graphml +63 -0
  38. graph/incidents_graphml/c/cf96e620-1146-11ee-9a03-6507ae27d54b.graphml +229 -0
  39. graph/incidents_graphml/c/cf9bab80-4af6-11ee-adcb-67c31ebac50c.graphml +63 -0
  40. graph/incidents_graphml/c/cf9bf5d0-7e8c-11ee-b44e-cd55abd836ec.graphml +63 -0
  41. graph/incidents_graphml/c/cfUSER-140380-5b8b-11ee-9925-ebc6745d6541.graphml +63 -0
  42. graph/incidents_graphml/c/cfa3ae80-2dc6-11ef-976a-4f91a87d18f6.graphml +63 -0
  43. graph/incidents_graphml/c/cfac4980-7e8c-11ee-b44e-cd55abd836ec.graphml +63 -0
  44. graph/incidents_graphml/c/cfacb810-1146-11ee-9a03-6507ae27d54b.graphml +193 -0
  45. graph/incidents_graphml/c/cfb03aa0-3245-11ef-9bb6-5bd0425d571b.graphml +63 -0
  46. graph/incidents_graphml/c/cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63.graphml +257 -0
  47. graph/incidents_graphml/c/cfb570f0-31cf-11ee-98fc-ffc5d40cae26.graphml +63 -0
  48. graph/incidents_graphml/c/cfc6b8b0-ff26-11ec-890e-b9233ab766d3.graphml +171 -0
  49. graph/incidents_graphml/c/cfcb9320-f381-11ee-b9e4-ef5a54940d7a.graphml +63 -0
  50. graph/incidents_graphml/c/cfd55500-31cf-11ee-98fc-ffc5d40cae26.graphml +63 -0
graph/incidents_graphml/c/cf276970-131d-11ee-8854-7b8acd154f2f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b94dfc42-0891-11ee-b4c4-43a688fa1320">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.53.38</data>
35
+ <data key="n_hostname">100.64.53.38</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.22.127.96</data>
43
+ <data key="n_hostname">172.22.127.96</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b94dfc42-0891-11ee-b4c4-43a688fa1320" target="HOST-2726">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687672924</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf276970-131d-11ee-8854-7b8acd154f2f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf283820-10d6-11ef-8c06-93e20871a0e5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="18d66d31-cf3b-11ee-83de-a3b6b6c00267">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.25.11</data>
35
+ <data key="n_hostname">100.64.25.11</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.232.220</data>
43
+ <data key="n_hostname">172.16.232.220</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="18d66d31-cf3b-11ee-83de-a3b6b6c00267" target="HOST-2748">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715570025</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf283820-10d6-11ef-8c06-93e20871a0e5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf3394f0-5b8b-11ee-9925-ebc6745d6541.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2552f5f2-1ce0-11ee-9f2f-6d145f466876">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.13.247</data>
35
+ <data key="n_hostname">100.64.13.247</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.1.127</data>
43
+ <data key="n_hostname">172.29.1.127</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3632" target="HOST-2713">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695636653</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf3394f0-5b8b-11ee-9925-ebc6745d6541</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf394f20-10d6-11ef-8c06-93e20871a0e5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="18d66d31-cf3b-11ee-83de-a3b6b6c00267">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.25.11</data>
43
+ <data key="n_hostname">100.64.25.11</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="HOST-5158">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715570025</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf394f20-10d6-11ef-8c06-93e20871a0e5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf3a3800-5fe6-11ee-80e7-7732713cc006.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.86.34</data>
35
+ <data key="n_hostname">172.23.86.34</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5a97b380-0cfb-11ee-8a56-8904b1a812cb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.16.40</data>
43
+ <data key="n_hostname">100.64.16.40</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2717" target="5a97b380-0cfb-11ee-8a56-8904b1a812cb">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696115541</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf3a3800-5fe6-11ee-80e7-7732713cc006</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf422d90-2dc6-11ef-976a-4f91a87d18f6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ab70243a-29d9-11ef-900f-f9a232c4e918">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.5</data>
35
+ <data key="n_hostname">100.64.81.5</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="7055bb61-28f5-11ef-b954-07429fc6e992">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="ab70243a-29d9-11ef-900f-f9a232c4e918" target="HOST-17013">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1718751737</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf422d90-2dc6-11ef-976a-4f91a87d18f6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf468a30-131d-11ee-8854-7b8acd154f2f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.22.127.96</data>
35
+ <data key="n_hostname">172.22.127.96</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b94dfc42-0891-11ee-b4c4-43a688fa1320">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.53.38</data>
43
+ <data key="n_hostname">100.64.53.38</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2726" target="HOST-9168">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687672924</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf468a30-131d-11ee-8854-7b8acd154f2f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf4966e0-5b8b-11ee-9925-ebc6745d6541.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.1.127</data>
35
+ <data key="n_hostname">172.29.1.127</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2552f5f2-1ce0-11ee-9f2f-6d145f466876">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.13.247</data>
43
+ <data key="n_hostname">100.64.13.247</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2713" target="HOST-3632">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695636653</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf4966e0-5b8b-11ee-9925-ebc6745d6541</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf49b720-7e8c-11ee-b44e-cd55abd836ec.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="dd279952-0634-11ee-9978-1353da5a37ae">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.32.9</data>
43
+ <data key="n_hostname">100.64.32.9</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="dd279952-0634-11ee-9978-1353da5a37ae">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699485373</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf49b720-7e8c-11ee-b44e-cd55abd836ec</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf4cfcb0-5fe6-11ee-80e7-7732713cc006.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="565016f3-0625-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.16.42</data>
35
+ <data key="n_hostname">100.64.16.42</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.25.222.10</data>
43
+ <data key="n_hostname">172.25.222.10</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="565016f3-0625-11ee-b173-c9921719c2f8" target="HOST-2768">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696115542</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf4cfcb0-5fe6-11ee-80e7-7732713cc006</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf5bf720-2dc6-11ef-976a-4f91a87d18f6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7055bb61-28f5-11ef-b954-07429fc6e992">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ab70243a-29d9-11ef-900f-f9a232c4e918">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.81.5</data>
43
+ <data key="n_hostname">100.64.81.5</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17013" target="HOST-17159">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1718751737</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf5bf720-2dc6-11ef-976a-4f91a87d18f6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf5c3ef0-5fe6-11ee-80e7-7732713cc006.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.25.222.10</data>
35
+ <data key="n_hostname">172.25.222.10</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="565016f3-0625-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.16.42</data>
43
+ <data key="n_hostname">100.64.16.42</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2768" target="HOST-3943">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696115542</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf5c3ef0-5fe6-11ee-80e7-7732713cc006</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf5d8cc0-92f9-11ed-844e-b1b9f26efb97.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fbd517f8-f79f-11ec-b920-4d692d7eb3b6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.85.99</data>
35
+ <data key="n_hostname">100.64.85.99</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c3afb687-84f5-11ed-9fc5-1f40ebcee8bb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.184.211.180</data>
43
+ <data key="n_hostname">10.184.211.180</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="fbd517f8-f79f-11ec-b920-4d692d7eb3b6" target="c3afb687-84f5-11ed-9fc5-1f40ebcee8bb">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1673583714</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf5d8cc0-92f9-11ed-844e-b1b9f26efb97</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf5db450-7e8c-11ee-b44e-cd55abd836ec.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.25.222.10</data>
35
+ <data key="n_hostname">172.25.222.10</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="dd279952-0634-11ee-9978-1353da5a37ae">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.32.9</data>
43
+ <data key="n_hostname">100.64.32.9</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2768" target="HOST-6152">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699485373</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf5db450-7e8c-11ee-b44e-cd55abd836ec</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf5f4250-131d-11ee-8854-7b8acd154f2f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f7c830c1-0626-11ee-8794-6bae0a4a6dd8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.14.171</data>
35
+ <data key="n_hostname">100.64.14.171</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.168.48</data>
43
+ <data key="n_hostname">172.30.168.48</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3735" target="HOST-2842">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687672925</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf5f4250-131d-11ee-8854-7b8acd154f2f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf613cd0-89bb-11ee-bba1-ef6459fc1a52.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.233.43</data>
35
+ <data key="n_hostname">172.16.233.43</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0caa5ea3-16f3-11ee-a886-716d1b7d88d0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.65.86</data>
43
+ <data key="n_hostname">100.64.65.86</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2758" target="0caa5ea3-16f3-11ee-a886-716d1b7d88d0">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700715022</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf613cd0-89bb-11ee-bba1-ef6459fc1a52</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf624610-5b8b-11ee-9925-ebc6745d6541.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.40.149</data>
35
+ <data key="n_hostname">172.29.40.149</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a2de6975-3543-11ee-859c-b76ddae3c8b2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.48</data>
43
+ <data key="n_hostname">100.64.18.48</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2834" target="a2de6975-3543-11ee-859c-b76ddae3c8b2">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695636653</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf624610-5b8b-11ee-9925-ebc6745d6541</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf62ac80-4ceb-11ee-b223-133fe64c82b5.graphml ADDED
@@ -0,0 +1,793 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="91dc0cc1-07fa-11ee-888c-11f31747ffd8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.36.124</data>
35
+ <data key="n_hostname">100.64.36.124</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.841796875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.23.117</data>
43
+ <data key="n_hostname">172.26.23.117</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.16.232.220</data>
51
+ <data key="n_hostname">172.16.232.220</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="bab2dfc0-09cb-11ee-b9a0-ef8e4cfa2e04">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.36.125</data>
59
+ <data key="n_hostname">100.64.36.125</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.578125</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.16.233.43</data>
67
+ <data key="n_hostname">172.16.233.43</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.841796875</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="e1fb4840-4c8f-11ee-8e7d-cb379d1d8e69">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.36.126</data>
75
+ <data key="n_hostname">100.64.36.126</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="2ba46052-062a-11ee-8578-99ce994a4216">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.36.127</data>
83
+ <data key="n_hostname">100.64.36.127</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">172.29.158.1</data>
91
+ <data key="n_hostname">172.29.158.1</data>
92
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.9208984375</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="90b1ddb0-448c-11ee-ae50-d99f28297763">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.36.128</data>
99
+ <data key="n_hostname">100.64.36.128</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.578125</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="12e1ebc2-3f30-11ee-bfc1-25b318540ffe">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.36.129</data>
107
+ <data key="n_hostname">100.64.36.129</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.578125</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">172.24.54.66</data>
115
+ <data key="n_hostname">172.24.54.66</data>
116
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">172.29.40.149</data>
123
+ <data key="n_hostname">172.29.40.149</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.71875</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">172.26.73.92</data>
131
+ <data key="n_hostname">172.26.73.92</data>
132
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.71875</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="109ea420-0c3b-11ee-994d-59e2984a0f56">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.26.101</data>
139
+ <data key="n_hostname">100.64.26.101</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.71875</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="33de1d91-4385-11ee-bb72-3552d0fe6ec6">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.36.130</data>
147
+ <data key="n_hostname">100.64.36.130</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.578125</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="b360b230-4989-11ee-8927-ddfd2c88fee8">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.36.131</data>
155
+ <data key="n_hostname">100.64.36.131</data>
156
+ <data key="n_set_roles">["Exploiting Host"]</data>
157
+ <data key="n_suspicion_score">0.578125</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="e88e75a2-4b19-11ee-b87f-8305d0edd87a">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.36.132</data>
163
+ <data key="n_hostname">100.64.36.132</data>
164
+ <data key="n_set_roles">["Exploiting Host"]</data>
165
+ <data key="n_suspicion_score">0.578125</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="ceab0323-21e7-11ee-ad8e-89f39d04e993">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.36.133</data>
171
+ <data key="n_hostname">100.64.36.133</data>
172
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
173
+ <data key="n_suspicion_score">0.71875</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="f4e42392-131f-11ee-bfcc-0536d612e0a0">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.36.134</data>
179
+ <data key="n_hostname">100.64.36.134</data>
180
+ <data key="n_set_roles">["Exploiting Host"]</data>
181
+ <data key="n_suspicion_score">0.4375</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <node id="16c4ee01-0627-11ee-bea9-5f52a09eb73a">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">100.64.10.103</data>
187
+ <data key="n_hostname">100.64.10.103</data>
188
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
189
+ <data key="n_suspicion_score">0.7890625</data>
190
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
191
+ </node>
192
+ <node id="2f7b0812-3dd3-11ee-aedd-574865ff758d">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">100.64.36.135</data>
195
+ <data key="n_hostname">100.64.36.135</data>
196
+ <data key="n_set_roles">["Exploiting Host"]</data>
197
+ <data key="n_suspicion_score">0.578125</data>
198
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
199
+ </node>
200
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">172.29.1.127</data>
203
+ <data key="n_hostname">172.29.1.127</data>
204
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
205
+ <data key="n_suspicion_score">0.71875</data>
206
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
207
+ </node>
208
+ <node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
209
+ <data key="n_type">HOST</data>
210
+ <data key="n_ip">172.18.96.192</data>
211
+ <data key="n_hostname">172.18.96.192</data>
212
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
213
+ <data key="n_suspicion_score">0.71875</data>
214
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
215
+ </node>
216
+ <node id="89a5b3c0-4847-11ee-9bc9-0b6de30a504b">
217
+ <data key="n_type">HOST</data>
218
+ <data key="n_ip">100.64.36.136</data>
219
+ <data key="n_hostname">100.64.36.136</data>
220
+ <data key="n_set_roles">["Exploiting Host"]</data>
221
+ <data key="n_suspicion_score">0.578125</data>
222
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
223
+ </node>
224
+ <node id="58da9a90-36c6-11ee-9941-c9608c590380">
225
+ <data key="n_type">HOST</data>
226
+ <data key="n_ip">100.64.36.137</data>
227
+ <data key="n_hostname">100.64.36.137</data>
228
+ <data key="n_set_roles">["Exploiting Host"]</data>
229
+ <data key="n_suspicion_score">0.4375</data>
230
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
231
+ </node>
232
+ <edge id="e1" source="91dc0cc1-07fa-11ee-888c-11f31747ffd8" target="HOST-2824">
233
+ <data key="e_type">INCIDENT_LINK</data>
234
+ <data key="e_timestamp">1694028617</data>
235
+ <data key="e_label_binary">malicious</data>
236
+ <data key="e_label_confidence">0.9208984375</data>
237
+ <data key="e_suspicion_score">0.9208984375</data>
238
+ <data key="e_mo_name">Data Theft</data>
239
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
240
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
241
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
242
+ <data key="e_lifecycle_stage">complete-mission</data>
243
+ <data key="e_disposition">Disrupted</data>
244
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
245
+ </edge>
246
+ <edge id="e2" source="91dc0cc1-07fa-11ee-888c-11f31747ffd8" target="HOST-2748">
247
+ <data key="e_type">INCIDENT_LINK</data>
248
+ <data key="e_timestamp">1694028617</data>
249
+ <data key="e_label_binary">malicious</data>
250
+ <data key="e_label_confidence">0.9208984375</data>
251
+ <data key="e_suspicion_score">0.9208984375</data>
252
+ <data key="e_mo_name">Data Theft</data>
253
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
254
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
255
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
256
+ <data key="e_lifecycle_stage">complete-mission</data>
257
+ <data key="e_disposition">Disrupted</data>
258
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
259
+ </edge>
260
+ <edge id="e3" source="bab2dfc0-09cb-11ee-b9a0-ef8e4cfa2e04" target="HOST-2758">
261
+ <data key="e_type">INCIDENT_LINK</data>
262
+ <data key="e_timestamp">1694028617</data>
263
+ <data key="e_label_binary">malicious</data>
264
+ <data key="e_label_confidence">0.9208984375</data>
265
+ <data key="e_suspicion_score">0.9208984375</data>
266
+ <data key="e_mo_name">Data Theft</data>
267
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
268
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
269
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
270
+ <data key="e_lifecycle_stage">complete-mission</data>
271
+ <data key="e_disposition">Disrupted</data>
272
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
273
+ </edge>
274
+ <edge id="e4" source="HOST-2758" target="bab2dfc0-09cb-11ee-b9a0-ef8e4cfa2e04">
275
+ <data key="e_type">INCIDENT_LINK</data>
276
+ <data key="e_timestamp">1694028617</data>
277
+ <data key="e_label_binary">malicious</data>
278
+ <data key="e_label_confidence">0.9208984375</data>
279
+ <data key="e_suspicion_score">0.9208984375</data>
280
+ <data key="e_mo_name">Data Theft</data>
281
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
282
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
283
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
284
+ <data key="e_lifecycle_stage">complete-mission</data>
285
+ <data key="e_disposition">Disrupted</data>
286
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
287
+ </edge>
288
+ <edge id="e5" source="e1fb4840-4c8f-11ee-8e7d-cb379d1d8e69" target="HOST-2758">
289
+ <data key="e_type">INCIDENT_LINK</data>
290
+ <data key="e_timestamp">1694028617</data>
291
+ <data key="e_label_binary">malicious</data>
292
+ <data key="e_label_confidence">0.9208984375</data>
293
+ <data key="e_suspicion_score">0.9208984375</data>
294
+ <data key="e_mo_name">Data Theft</data>
295
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
296
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
297
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
298
+ <data key="e_lifecycle_stage">complete-mission</data>
299
+ <data key="e_disposition">Disrupted</data>
300
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
301
+ </edge>
302
+ <edge id="e6" source="HOST-2758" target="e1fb4840-4c8f-11ee-8e7d-cb379d1d8e69">
303
+ <data key="e_type">INCIDENT_LINK</data>
304
+ <data key="e_timestamp">1694028617</data>
305
+ <data key="e_label_binary">malicious</data>
306
+ <data key="e_label_confidence">0.9208984375</data>
307
+ <data key="e_suspicion_score">0.9208984375</data>
308
+ <data key="e_mo_name">Data Theft</data>
309
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
310
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
311
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
312
+ <data key="e_lifecycle_stage">complete-mission</data>
313
+ <data key="e_disposition">Disrupted</data>
314
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
315
+ </edge>
316
+ <edge id="e7" source="2ba46052-062a-11ee-8578-99ce994a4216" target="HOST-2858">
317
+ <data key="e_type">INCIDENT_LINK</data>
318
+ <data key="e_timestamp">1694028617</data>
319
+ <data key="e_label_binary">malicious</data>
320
+ <data key="e_label_confidence">0.9208984375</data>
321
+ <data key="e_suspicion_score">0.9208984375</data>
322
+ <data key="e_mo_name">Data Theft</data>
323
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
324
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
325
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
326
+ <data key="e_lifecycle_stage">complete-mission</data>
327
+ <data key="e_disposition">Disrupted</data>
328
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
329
+ </edge>
330
+ <edge id="e8" source="HOST-2858" target="2ba46052-062a-11ee-8578-99ce994a4216">
331
+ <data key="e_type">INCIDENT_LINK</data>
332
+ <data key="e_timestamp">1694028617</data>
333
+ <data key="e_label_binary">malicious</data>
334
+ <data key="e_label_confidence">0.9208984375</data>
335
+ <data key="e_suspicion_score">0.9208984375</data>
336
+ <data key="e_mo_name">Data Theft</data>
337
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
338
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
339
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
340
+ <data key="e_lifecycle_stage">complete-mission</data>
341
+ <data key="e_disposition">Disrupted</data>
342
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
343
+ </edge>
344
+ <edge id="e9" source="90b1ddb0-448c-11ee-ae50-d99f28297763" target="HOST-2858">
345
+ <data key="e_type">INCIDENT_LINK</data>
346
+ <data key="e_timestamp">1694028617</data>
347
+ <data key="e_label_binary">malicious</data>
348
+ <data key="e_label_confidence">0.9208984375</data>
349
+ <data key="e_suspicion_score">0.9208984375</data>
350
+ <data key="e_mo_name">Data Theft</data>
351
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
352
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
353
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
354
+ <data key="e_lifecycle_stage">complete-mission</data>
355
+ <data key="e_disposition">Disrupted</data>
356
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
357
+ </edge>
358
+ <edge id="e10" source="HOST-2858" target="90b1ddb0-448c-11ee-ae50-d99f28297763">
359
+ <data key="e_type">INCIDENT_LINK</data>
360
+ <data key="e_timestamp">1694028617</data>
361
+ <data key="e_label_binary">malicious</data>
362
+ <data key="e_label_confidence">0.9208984375</data>
363
+ <data key="e_suspicion_score">0.9208984375</data>
364
+ <data key="e_mo_name">Data Theft</data>
365
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
366
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
367
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
368
+ <data key="e_lifecycle_stage">complete-mission</data>
369
+ <data key="e_disposition">Disrupted</data>
370
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
371
+ </edge>
372
+ <edge id="e11" source="e1fb4840-4c8f-11ee-8e7d-cb379d1d8e69" target="HOST-2858">
373
+ <data key="e_type">INCIDENT_LINK</data>
374
+ <data key="e_timestamp">1694028617</data>
375
+ <data key="e_label_binary">malicious</data>
376
+ <data key="e_label_confidence">0.9208984375</data>
377
+ <data key="e_suspicion_score">0.9208984375</data>
378
+ <data key="e_mo_name">Data Theft</data>
379
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
380
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
381
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
382
+ <data key="e_lifecycle_stage">complete-mission</data>
383
+ <data key="e_disposition">Disrupted</data>
384
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
385
+ </edge>
386
+ <edge id="e12" source="HOST-2858" target="e1fb4840-4c8f-11ee-8e7d-cb379d1d8e69">
387
+ <data key="e_type">INCIDENT_LINK</data>
388
+ <data key="e_timestamp">1694028617</data>
389
+ <data key="e_label_binary">malicious</data>
390
+ <data key="e_label_confidence">0.9208984375</data>
391
+ <data key="e_suspicion_score">0.9208984375</data>
392
+ <data key="e_mo_name">Data Theft</data>
393
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
394
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
395
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
396
+ <data key="e_lifecycle_stage">complete-mission</data>
397
+ <data key="e_disposition">Disrupted</data>
398
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
399
+ </edge>
400
+ <edge id="e13" source="12e1ebc2-3f30-11ee-bfc1-25b318540ffe" target="HOST-2858">
401
+ <data key="e_type">INCIDENT_LINK</data>
402
+ <data key="e_timestamp">1694028617</data>
403
+ <data key="e_label_binary">malicious</data>
404
+ <data key="e_label_confidence">0.9208984375</data>
405
+ <data key="e_suspicion_score">0.9208984375</data>
406
+ <data key="e_mo_name">Data Theft</data>
407
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
408
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
409
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
410
+ <data key="e_lifecycle_stage">complete-mission</data>
411
+ <data key="e_disposition">Disrupted</data>
412
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
413
+ </edge>
414
+ <edge id="e14" source="HOST-2858" target="12e1ebc2-3f30-11ee-bfc1-25b318540ffe">
415
+ <data key="e_type">INCIDENT_LINK</data>
416
+ <data key="e_timestamp">1694028617</data>
417
+ <data key="e_label_binary">malicious</data>
418
+ <data key="e_label_confidence">0.9208984375</data>
419
+ <data key="e_suspicion_score">0.9208984375</data>
420
+ <data key="e_mo_name">Data Theft</data>
421
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
422
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
423
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
424
+ <data key="e_lifecycle_stage">complete-mission</data>
425
+ <data key="e_disposition">Disrupted</data>
426
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
427
+ </edge>
428
+ <edge id="e15" source="91dc0cc1-07fa-11ee-888c-11f31747ffd8" target="HOST-2858">
429
+ <data key="e_type">INCIDENT_LINK</data>
430
+ <data key="e_timestamp">1694028617</data>
431
+ <data key="e_label_binary">malicious</data>
432
+ <data key="e_label_confidence">0.9208984375</data>
433
+ <data key="e_suspicion_score">0.9208984375</data>
434
+ <data key="e_mo_name">Data Theft</data>
435
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
436
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
437
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
438
+ <data key="e_lifecycle_stage">complete-mission</data>
439
+ <data key="e_disposition">Disrupted</data>
440
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
441
+ </edge>
442
+ <edge id="e16" source="HOST-2858" target="91dc0cc1-07fa-11ee-888c-11f31747ffd8">
443
+ <data key="e_type">INCIDENT_LINK</data>
444
+ <data key="e_timestamp">1694028617</data>
445
+ <data key="e_label_binary">malicious</data>
446
+ <data key="e_label_confidence">0.9208984375</data>
447
+ <data key="e_suspicion_score">0.9208984375</data>
448
+ <data key="e_mo_name">Data Theft</data>
449
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
450
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
451
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
452
+ <data key="e_lifecycle_stage">complete-mission</data>
453
+ <data key="e_disposition">Disrupted</data>
454
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
455
+ </edge>
456
+ <edge id="e17" source="91dc0cc1-07fa-11ee-888c-11f31747ffd8" target="HOST-2745">
457
+ <data key="e_type">INCIDENT_LINK</data>
458
+ <data key="e_timestamp">1694028617</data>
459
+ <data key="e_label_binary">malicious</data>
460
+ <data key="e_label_confidence">0.9208984375</data>
461
+ <data key="e_suspicion_score">0.9208984375</data>
462
+ <data key="e_mo_name">Data Theft</data>
463
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
464
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
465
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
466
+ <data key="e_lifecycle_stage">complete-mission</data>
467
+ <data key="e_disposition">Disrupted</data>
468
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
469
+ </edge>
470
+ <edge id="e18" source="91dc0cc1-07fa-11ee-888c-11f31747ffd8" target="HOST-2834">
471
+ <data key="e_type">INCIDENT_LINK</data>
472
+ <data key="e_timestamp">1694028617</data>
473
+ <data key="e_label_binary">malicious</data>
474
+ <data key="e_label_confidence">0.9208984375</data>
475
+ <data key="e_suspicion_score">0.9208984375</data>
476
+ <data key="e_mo_name">Data Theft</data>
477
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
478
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
479
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
480
+ <data key="e_lifecycle_stage">complete-mission</data>
481
+ <data key="e_disposition">Disrupted</data>
482
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
483
+ </edge>
484
+ <edge id="e19" source="91dc0cc1-07fa-11ee-888c-11f31747ffd8" target="HOST-2724">
485
+ <data key="e_type">INCIDENT_LINK</data>
486
+ <data key="e_timestamp">1694028617</data>
487
+ <data key="e_label_binary">malicious</data>
488
+ <data key="e_label_confidence">0.9208984375</data>
489
+ <data key="e_suspicion_score">0.9208984375</data>
490
+ <data key="e_mo_name">Data Theft</data>
491
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
492
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
493
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
494
+ <data key="e_lifecycle_stage">complete-mission</data>
495
+ <data key="e_disposition">Disrupted</data>
496
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
497
+ </edge>
498
+ <edge id="e20" source="HOST-5365" target="HOST-2858">
499
+ <data key="e_type">INCIDENT_LINK</data>
500
+ <data key="e_timestamp">1694028617</data>
501
+ <data key="e_label_binary">malicious</data>
502
+ <data key="e_label_confidence">0.9208984375</data>
503
+ <data key="e_suspicion_score">0.9208984375</data>
504
+ <data key="e_mo_name">Data Theft</data>
505
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
506
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
507
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
508
+ <data key="e_lifecycle_stage">complete-mission</data>
509
+ <data key="e_disposition">Disrupted</data>
510
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
511
+ </edge>
512
+ <edge id="e21" source="HOST-2858" target="HOST-5365">
513
+ <data key="e_type">INCIDENT_LINK</data>
514
+ <data key="e_timestamp">1694028617</data>
515
+ <data key="e_label_binary">malicious</data>
516
+ <data key="e_label_confidence">0.9208984375</data>
517
+ <data key="e_suspicion_score">0.9208984375</data>
518
+ <data key="e_mo_name">Data Theft</data>
519
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
520
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
521
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
522
+ <data key="e_lifecycle_stage">complete-mission</data>
523
+ <data key="e_disposition">Disrupted</data>
524
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
525
+ </edge>
526
+ <edge id="e22" source="HOST-2758" target="33de1d91-4385-11ee-bb72-3552d0fe6ec6">
527
+ <data key="e_type">INCIDENT_LINK</data>
528
+ <data key="e_timestamp">1694028617</data>
529
+ <data key="e_label_binary">malicious</data>
530
+ <data key="e_label_confidence">0.9208984375</data>
531
+ <data key="e_suspicion_score">0.9208984375</data>
532
+ <data key="e_mo_name">Data Theft</data>
533
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
534
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
535
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
536
+ <data key="e_lifecycle_stage">complete-mission</data>
537
+ <data key="e_disposition">Disrupted</data>
538
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
539
+ </edge>
540
+ <edge id="e23" source="33de1d91-4385-11ee-bb72-3552d0fe6ec6" target="HOST-2758">
541
+ <data key="e_type">INCIDENT_LINK</data>
542
+ <data key="e_timestamp">1694028617</data>
543
+ <data key="e_label_binary">malicious</data>
544
+ <data key="e_label_confidence">0.9208984375</data>
545
+ <data key="e_suspicion_score">0.9208984375</data>
546
+ <data key="e_mo_name">Data Theft</data>
547
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
548
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
549
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
550
+ <data key="e_lifecycle_stage">complete-mission</data>
551
+ <data key="e_disposition">Disrupted</data>
552
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
553
+ </edge>
554
+ <edge id="e24" source="b360b230-4989-11ee-8927-ddfd2c88fee8" target="HOST-2758">
555
+ <data key="e_type">INCIDENT_LINK</data>
556
+ <data key="e_timestamp">1694028617</data>
557
+ <data key="e_label_binary">malicious</data>
558
+ <data key="e_label_confidence">0.9208984375</data>
559
+ <data key="e_suspicion_score">0.9208984375</data>
560
+ <data key="e_mo_name">Data Theft</data>
561
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
562
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
563
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
564
+ <data key="e_lifecycle_stage">complete-mission</data>
565
+ <data key="e_disposition">Disrupted</data>
566
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
567
+ </edge>
568
+ <edge id="e25" source="HOST-2758" target="b360b230-4989-11ee-8927-ddfd2c88fee8">
569
+ <data key="e_type">INCIDENT_LINK</data>
570
+ <data key="e_timestamp">1694028617</data>
571
+ <data key="e_label_binary">malicious</data>
572
+ <data key="e_label_confidence">0.9208984375</data>
573
+ <data key="e_suspicion_score">0.9208984375</data>
574
+ <data key="e_mo_name">Data Theft</data>
575
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
576
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
577
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
578
+ <data key="e_lifecycle_stage">complete-mission</data>
579
+ <data key="e_disposition">Disrupted</data>
580
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
581
+ </edge>
582
+ <edge id="e26" source="e88e75a2-4b19-11ee-b87f-8305d0edd87a" target="HOST-2758">
583
+ <data key="e_type">INCIDENT_LINK</data>
584
+ <data key="e_timestamp">1694028617</data>
585
+ <data key="e_label_binary">malicious</data>
586
+ <data key="e_label_confidence">0.9208984375</data>
587
+ <data key="e_suspicion_score">0.9208984375</data>
588
+ <data key="e_mo_name">Data Theft</data>
589
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
590
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
591
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
592
+ <data key="e_lifecycle_stage">complete-mission</data>
593
+ <data key="e_disposition">Disrupted</data>
594
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
595
+ </edge>
596
+ <edge id="e27" source="HOST-2758" target="e88e75a2-4b19-11ee-b87f-8305d0edd87a">
597
+ <data key="e_type">INCIDENT_LINK</data>
598
+ <data key="e_timestamp">1694028617</data>
599
+ <data key="e_label_binary">malicious</data>
600
+ <data key="e_label_confidence">0.9208984375</data>
601
+ <data key="e_suspicion_score">0.9208984375</data>
602
+ <data key="e_mo_name">Data Theft</data>
603
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
604
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
605
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
606
+ <data key="e_lifecycle_stage">complete-mission</data>
607
+ <data key="e_disposition">Disrupted</data>
608
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
609
+ </edge>
610
+ <edge id="e28" source="ceab0323-21e7-11ee-ad8e-89f39d04e993" target="HOST-2758">
611
+ <data key="e_type">INCIDENT_LINK</data>
612
+ <data key="e_timestamp">1694028617</data>
613
+ <data key="e_label_binary">malicious</data>
614
+ <data key="e_label_confidence">0.9208984375</data>
615
+ <data key="e_suspicion_score">0.9208984375</data>
616
+ <data key="e_mo_name">Data Theft</data>
617
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
618
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
619
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
620
+ <data key="e_lifecycle_stage">complete-mission</data>
621
+ <data key="e_disposition">Disrupted</data>
622
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
623
+ </edge>
624
+ <edge id="e29" source="HOST-2758" target="ceab0323-21e7-11ee-ad8e-89f39d04e993">
625
+ <data key="e_type">INCIDENT_LINK</data>
626
+ <data key="e_timestamp">1694028617</data>
627
+ <data key="e_label_binary">malicious</data>
628
+ <data key="e_label_confidence">0.9208984375</data>
629
+ <data key="e_suspicion_score">0.9208984375</data>
630
+ <data key="e_mo_name">Data Theft</data>
631
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
632
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
633
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
634
+ <data key="e_lifecycle_stage">complete-mission</data>
635
+ <data key="e_disposition">Disrupted</data>
636
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
637
+ </edge>
638
+ <edge id="e30" source="f4e42392-131f-11ee-bfcc-0536d612e0a0" target="HOST-2758">
639
+ <data key="e_type">INCIDENT_LINK</data>
640
+ <data key="e_timestamp">1694028617</data>
641
+ <data key="e_label_binary">malicious</data>
642
+ <data key="e_label_confidence">0.9208984375</data>
643
+ <data key="e_suspicion_score">0.9208984375</data>
644
+ <data key="e_mo_name">Data Theft</data>
645
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
646
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
647
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
648
+ <data key="e_lifecycle_stage">complete-mission</data>
649
+ <data key="e_disposition">Disrupted</data>
650
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
651
+ </edge>
652
+ <edge id="e31" source="HOST-2758" target="f4e42392-131f-11ee-bfcc-0536d612e0a0">
653
+ <data key="e_type">INCIDENT_LINK</data>
654
+ <data key="e_timestamp">1694028617</data>
655
+ <data key="e_label_binary">malicious</data>
656
+ <data key="e_label_confidence">0.9208984375</data>
657
+ <data key="e_suspicion_score">0.9208984375</data>
658
+ <data key="e_mo_name">Data Theft</data>
659
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
660
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
661
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
662
+ <data key="e_lifecycle_stage">complete-mission</data>
663
+ <data key="e_disposition">Disrupted</data>
664
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
665
+ </edge>
666
+ <edge id="e32" source="HOST-3162" target="HOST-2858">
667
+ <data key="e_type">INCIDENT_LINK</data>
668
+ <data key="e_timestamp">1694028617</data>
669
+ <data key="e_label_binary">malicious</data>
670
+ <data key="e_label_confidence">0.9208984375</data>
671
+ <data key="e_suspicion_score">0.9208984375</data>
672
+ <data key="e_mo_name">Data Theft</data>
673
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
674
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
675
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
676
+ <data key="e_lifecycle_stage">complete-mission</data>
677
+ <data key="e_disposition">Disrupted</data>
678
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
679
+ </edge>
680
+ <edge id="e33" source="HOST-2858" target="HOST-3162">
681
+ <data key="e_type">INCIDENT_LINK</data>
682
+ <data key="e_timestamp">1694028617</data>
683
+ <data key="e_label_binary">malicious</data>
684
+ <data key="e_label_confidence">0.9208984375</data>
685
+ <data key="e_suspicion_score">0.9208984375</data>
686
+ <data key="e_mo_name">Data Theft</data>
687
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
688
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
689
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
690
+ <data key="e_lifecycle_stage">complete-mission</data>
691
+ <data key="e_disposition">Disrupted</data>
692
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
693
+ </edge>
694
+ <edge id="e34" source="2f7b0812-3dd3-11ee-aedd-574865ff758d" target="HOST-2858">
695
+ <data key="e_type">INCIDENT_LINK</data>
696
+ <data key="e_timestamp">1694028617</data>
697
+ <data key="e_label_binary">malicious</data>
698
+ <data key="e_label_confidence">0.9208984375</data>
699
+ <data key="e_suspicion_score">0.9208984375</data>
700
+ <data key="e_mo_name">Data Theft</data>
701
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
702
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
703
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
704
+ <data key="e_lifecycle_stage">complete-mission</data>
705
+ <data key="e_disposition">Disrupted</data>
706
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
707
+ </edge>
708
+ <edge id="e35" source="HOST-2858" target="2f7b0812-3dd3-11ee-aedd-574865ff758d">
709
+ <data key="e_type">INCIDENT_LINK</data>
710
+ <data key="e_timestamp">1694028617</data>
711
+ <data key="e_label_binary">malicious</data>
712
+ <data key="e_label_confidence">0.9208984375</data>
713
+ <data key="e_suspicion_score">0.9208984375</data>
714
+ <data key="e_mo_name">Data Theft</data>
715
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
716
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
717
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
718
+ <data key="e_lifecycle_stage">complete-mission</data>
719
+ <data key="e_disposition">Disrupted</data>
720
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
721
+ </edge>
722
+ <edge id="e36" source="91dc0cc1-07fa-11ee-888c-11f31747ffd8" target="HOST-2713">
723
+ <data key="e_type">INCIDENT_LINK</data>
724
+ <data key="e_timestamp">1694028617</data>
725
+ <data key="e_label_binary">malicious</data>
726
+ <data key="e_label_confidence">0.9208984375</data>
727
+ <data key="e_suspicion_score">0.9208984375</data>
728
+ <data key="e_mo_name">Data Theft</data>
729
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
730
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
731
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
732
+ <data key="e_lifecycle_stage">complete-mission</data>
733
+ <data key="e_disposition">Disrupted</data>
734
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
735
+ </edge>
736
+ <edge id="e37" source="91dc0cc1-07fa-11ee-888c-11f31747ffd8" target="HOST-2715">
737
+ <data key="e_type">INCIDENT_LINK</data>
738
+ <data key="e_timestamp">1694028617</data>
739
+ <data key="e_label_binary">malicious</data>
740
+ <data key="e_label_confidence">0.9208984375</data>
741
+ <data key="e_suspicion_score">0.9208984375</data>
742
+ <data key="e_mo_name">Data Theft</data>
743
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
744
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
745
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
746
+ <data key="e_lifecycle_stage">complete-mission</data>
747
+ <data key="e_disposition">Disrupted</data>
748
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
749
+ </edge>
750
+ <edge id="e38" source="HOST-2758" target="89a5b3c0-4847-11ee-9bc9-0b6de30a504b">
751
+ <data key="e_type">INCIDENT_LINK</data>
752
+ <data key="e_timestamp">1694028617</data>
753
+ <data key="e_label_binary">malicious</data>
754
+ <data key="e_label_confidence">0.9208984375</data>
755
+ <data key="e_suspicion_score">0.9208984375</data>
756
+ <data key="e_mo_name">Data Theft</data>
757
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
758
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
759
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
760
+ <data key="e_lifecycle_stage">complete-mission</data>
761
+ <data key="e_disposition">Disrupted</data>
762
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
763
+ </edge>
764
+ <edge id="e39" source="58da9a90-36c6-11ee-9941-c9608c590380" target="HOST-2858">
765
+ <data key="e_type">INCIDENT_LINK</data>
766
+ <data key="e_timestamp">1694028617</data>
767
+ <data key="e_label_binary">malicious</data>
768
+ <data key="e_label_confidence">0.9208984375</data>
769
+ <data key="e_suspicion_score">0.9208984375</data>
770
+ <data key="e_mo_name">Data Theft</data>
771
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
772
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
773
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
774
+ <data key="e_lifecycle_stage">complete-mission</data>
775
+ <data key="e_disposition">Disrupted</data>
776
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
777
+ </edge>
778
+ <edge id="e40" source="HOST-2858" target="58da9a90-36c6-11ee-9941-c9608c590380">
779
+ <data key="e_type">INCIDENT_LINK</data>
780
+ <data key="e_timestamp">1694028617</data>
781
+ <data key="e_label_binary">malicious</data>
782
+ <data key="e_label_confidence">0.9208984375</data>
783
+ <data key="e_suspicion_score">0.9208984375</data>
784
+ <data key="e_mo_name">Data Theft</data>
785
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
786
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
787
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
788
+ <data key="e_lifecycle_stage">complete-mission</data>
789
+ <data key="e_disposition">Disrupted</data>
790
+ <data key="e_incident_id">cf62ac80-4ceb-11ee-b223-133fe64c82b5</data>
791
+ </edge>
792
+ </graph>
793
+ </graphml>
graph/incidents_graphml/c/cf62e3f0-92f9-11ed-844e-b1b9f26efb97.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c3afb687-84f5-11ed-9fc5-1f40ebcee8bb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.184.211.180</data>
35
+ <data key="n_hostname">10.184.211.180</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="fbd517f8-f79f-11ec-b920-4d692d7eb3b6">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.85.99</data>
43
+ <data key="n_hostname">100.64.85.99</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17008" target="HOST-17007">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1673583714</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf62e3f0-92f9-11ed-844e-b1b9f26efb97</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf69d380-5fe6-11ee-80e7-7732713cc006.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="457bcfd0-0626-11ee-8794-6bae0a4a6dd8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.10.46</data>
35
+ <data key="n_hostname">100.64.10.46</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3134" target="HOST-2703">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696115542</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf69d380-5fe6-11ee-80e7-7732713cc006</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf69e8d0-92f9-11ed-844e-b1b9f26efb97.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="dac898e1-0616-11ed-8e3e-a9b420414a81">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.78</data>
35
+ <data key="n_hostname">100.64.68.78</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="dac898e1-0616-11ed-8e3e-a9b420414a81" target="HOST-16881">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1673583714</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf69e8d0-92f9-11ed-844e-b1b9f26efb97</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf6a7c90-f84f-11ec-8cad-d3b902a073da.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2ac83750-ead9-11ec-a136-d95e51c18b59">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.247</data>
35
+ <data key="n_hostname">USER-0015-1608.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="22879b40-ea92-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.248</data>
43
+ <data key="n_hostname">100.64.70.248</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="2ac83750-ead9-11ec-a136-d95e51c18b59" target="22879b40-ea92-11ec-90c7-eff83c975df3">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1656578220</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf6a7c90-f84f-11ec-8cad-d3b902a073da</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf6c3340-7e8c-11ee-b44e-cd55abd836ec.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="35cb7ef0-7e7b-11ee-afe7-45ddcebc345a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.32.11</data>
35
+ <data key="n_hostname">100.64.32.11</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.22.127.96</data>
43
+ <data key="n_hostname">172.22.127.96</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="35cb7ef0-7e7b-11ee-afe7-45ddcebc345a" target="HOST-2726">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699485373</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf6c3340-7e8c-11ee-b44e-cd55abd836ec</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf6fdc40-92f9-11ed-844e-b1b9f26efb97.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="dac898e1-0616-11ed-8e3e-a9b420414a81">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.78</data>
43
+ <data key="n_hostname">100.64.68.78</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16881" target="HOST-17009">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1673583714</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf6fdc40-92f9-11ed-844e-b1b9f26efb97</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf722cc0-89bb-11ee-bba1-ef6459fc1a52.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a86202e0-062b-11ee-bd05-cbfb0d0909eb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.16.112</data>
35
+ <data key="n_hostname">100.64.16.112</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3986" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700715022</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf722cc0-89bb-11ee-bba1-ef6459fc1a52</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf787980-5fe6-11ee-80e7-7732713cc006.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.27.202.53</data>
35
+ <data key="n_hostname">172.27.202.53</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="457bcfd0-0626-11ee-8794-6bae0a4a6dd8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.10.46</data>
43
+ <data key="n_hostname">100.64.10.46</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2703" target="HOST-3134">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696115542</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf787980-5fe6-11ee-80e7-7732713cc006</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf798fe0-4ceb-11ee-b223-133fe64c82b5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.23.117</data>
35
+ <data key="n_hostname">172.26.23.117</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="91dc0cc1-07fa-11ee-888c-11f31747ffd8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.36.124</data>
43
+ <data key="n_hostname">100.64.36.124</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2824" target="HOST-6731">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694028617</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf798fe0-4ceb-11ee-b223-133fe64c82b5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf7a0d20-4423-11ed-8338-1b551ccaa997.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="293fa292-41ac-11ed-a587-21753cf039e4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.72.43</data>
35
+ <data key="n_hostname">100.64.72.43</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="11bc6070-41a9-11ed-a587-21753cf039e4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="293fa292-41ac-11ed-a587-21753cf039e4" target="HOST-12811">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1664915611</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf7a0d20-4423-11ed-8338-1b551ccaa997</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf7bc3a0-7e8c-11ee-b44e-cd55abd836ec.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.22.127.96</data>
35
+ <data key="n_hostname">172.22.127.96</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="35cb7ef0-7e7b-11ee-afe7-45ddcebc345a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.32.11</data>
43
+ <data key="n_hostname">100.64.32.11</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2726" target="HOST-6153">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699485373</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf7bc3a0-7e8c-11ee-b44e-cd55abd836ec</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf80a970-4af6-11ee-adcb-67c31ebac50c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="12c5b804-105b-11ee-b127-550112f04cb7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.50.55</data>
35
+ <data key="n_hostname">100.64.50.55</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.1.127</data>
43
+ <data key="n_hostname">172.29.1.127</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="12c5b804-105b-11ee-b127-550112f04cb7" target="HOST-2713">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693813439</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf80a970-4af6-11ee-adcb-67c31ebac50c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf80ad00-131d-11ee-8854-7b8acd154f2f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="f7c830c1-0626-11ee-8794-6bae0a4a6dd8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.14.171</data>
43
+ <data key="n_hostname">100.64.14.171</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="HOST-3735">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687672925</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf80ad00-131d-11ee-8854-7b8acd154f2f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf82a780-89bb-11ee-bba1-ef6459fc1a52.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a86202e0-062b-11ee-bd05-cbfb0d0909eb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.16.112</data>
43
+ <data key="n_hostname">100.64.16.112</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-3986">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700715022</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf82a780-89bb-11ee-bba1-ef6459fc1a52</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf848bc0-2ff4-11ee-b00f-c1ca007fb916.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7fc28312-2fc9-11ee-b1a9-a762f31207a8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.11.134</data>
35
+ <data key="n_hostname">100.64.11.134</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="16bd37c8-0625-11ee-b1da-51fe1d4afc9b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.8</data>
43
+ <data key="n_hostname">100.64.68.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.746875</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="f5a0ba14-2147-11ee-b2f3-53c817987d20">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.19.238</data>
51
+ <data key="n_hostname">100.64.19.238</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.49375</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="ad870e1f-0625-11ee-a31e-2bbd16ce2d59">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.25.69</data>
59
+ <data key="n_hostname">100.64.25.69</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.6625</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <node id="bde4c5a5-0624-11ee-b3ca-a7be26d46ce3">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.18.74</data>
67
+ <data key="n_hostname">100.64.18.74</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.6625</data>
70
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
71
+ </node>
72
+ <edge id="e1" source="HOST-11703" target="HOST-11395">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1690843899</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.746875</data>
77
+ <data key="e_suspicion_score">0.746875</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Disrupted</data>
84
+ <data key="e_incident_id">cf848bc0-2ff4-11ee-b00f-c1ca007fb916</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-11395" target="HOST-11703">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1690843899</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.746875</data>
91
+ <data key="e_suspicion_score">0.746875</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Disrupted</data>
98
+ <data key="e_incident_id">cf848bc0-2ff4-11ee-b00f-c1ca007fb916</data>
99
+ </edge>
100
+ <edge id="e3" source="f5a0ba14-2147-11ee-b2f3-53c817987d20" target="HOST-11395">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1690843899</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.746875</data>
105
+ <data key="e_suspicion_score">0.746875</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Disrupted</data>
112
+ <data key="e_incident_id">cf848bc0-2ff4-11ee-b00f-c1ca007fb916</data>
113
+ </edge>
114
+ <edge id="e4" source="HOST-11395" target="f5a0ba14-2147-11ee-b2f3-53c817987d20">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1690843899</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.746875</data>
119
+ <data key="e_suspicion_score">0.746875</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Disrupted</data>
126
+ <data key="e_incident_id">cf848bc0-2ff4-11ee-b00f-c1ca007fb916</data>
127
+ </edge>
128
+ <edge id="e5" source="HOST-11395" target="HOST-11615">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1690843899</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.746875</data>
133
+ <data key="e_suspicion_score">0.746875</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">cf848bc0-2ff4-11ee-b00f-c1ca007fb916</data>
141
+ </edge>
142
+ <edge id="e6" source="HOST-11615" target="HOST-11395">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1690843899</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.746875</data>
147
+ <data key="e_suspicion_score">0.746875</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">cf848bc0-2ff4-11ee-b00f-c1ca007fb916</data>
155
+ </edge>
156
+ <edge id="e7" source="HOST-11395" target="HOST-11465">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1690843899</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.746875</data>
161
+ <data key="e_suspicion_score">0.746875</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">cf848bc0-2ff4-11ee-b00f-c1ca007fb916</data>
169
+ </edge>
170
+ <edge id="e8" source="HOST-11465" target="HOST-11395">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1690843899</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.746875</data>
175
+ <data key="e_suspicion_score">0.746875</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Disrupted</data>
182
+ <data key="e_incident_id">cf848bc0-2ff4-11ee-b00f-c1ca007fb916</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>
graph/incidents_graphml/c/cf8a1b80-7e8c-11ee-b44e-cd55abd836ec.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0fd5f310-063f-11ee-bee5-75367837c358">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.32.13</data>
35
+ <data key="n_hostname">100.64.32.13</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.23.117</data>
43
+ <data key="n_hostname">172.26.23.117</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="0fd5f310-063f-11ee-bee5-75367837c358" target="HOST-2824">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699485373</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf8a1b80-7e8c-11ee-b44e-cd55abd836ec</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf8eb330-4af6-11ee-adcb-67c31ebac50c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.1.127</data>
35
+ <data key="n_hostname">172.29.1.127</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="12c5b804-105b-11ee-b127-550112f04cb7">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.50.55</data>
43
+ <data key="n_hostname">100.64.50.55</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2713" target="HOST-8740">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693813440</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf8eb330-4af6-11ee-adcb-67c31ebac50c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b.graphml ADDED
@@ -0,0 +1,293 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8da0e140-2ea0-11ee-b96b-2b942769876e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.142</data>
35
+ <data key="n_hostname">100.64.17.142</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.217.8</data>
43
+ <data key="n_hostname">172.24.217.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.201.119</data>
51
+ <data key="n_hostname">172.30.201.119</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.841796875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="960d8890-0625-11ee-87d2-5909d78e9e20">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.17.143</data>
59
+ <data key="n_hostname">100.64.17.143</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="41d232a3-1d39-11ee-9f21-d78f348ef256">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.17.144</data>
67
+ <data key="n_hostname">100.64.17.144</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.71875</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="0a7743b2-fbfd-11ee-9638-79602c101fad">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.17.145</data>
75
+ <data key="n_hostname">100.64.17.145</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="32c98c60-4fd2-11ee-93eb-5f6ed73039b3">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.17.146</data>
83
+ <data key="n_hostname">100.64.17.146</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="8bc456f0-db24-11ee-9574-5d61046e1f61">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.17.147</data>
91
+ <data key="n_hostname">100.64.17.147</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.578125</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <edge id="e1" source="8da0e140-2ea0-11ee-b96b-2b942769876e" target="HOST-2731">
97
+ <data key="e_type">INCIDENT_LINK</data>
98
+ <data key="e_timestamp">1714030280</data>
99
+ <data key="e_label_binary">malicious</data>
100
+ <data key="e_label_confidence">0.841796875</data>
101
+ <data key="e_suspicion_score">0.841796875</data>
102
+ <data key="e_mo_name">Data Theft</data>
103
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
104
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
105
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
106
+ <data key="e_lifecycle_stage">complete-mission</data>
107
+ <data key="e_disposition">Disrupted</data>
108
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
109
+ </edge>
110
+ <edge id="e2" source="HOST-2731" target="8da0e140-2ea0-11ee-b96b-2b942769876e">
111
+ <data key="e_type">INCIDENT_LINK</data>
112
+ <data key="e_timestamp">1714030280</data>
113
+ <data key="e_label_binary">malicious</data>
114
+ <data key="e_label_confidence">0.841796875</data>
115
+ <data key="e_suspicion_score">0.841796875</data>
116
+ <data key="e_mo_name">Data Theft</data>
117
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
118
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
119
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
120
+ <data key="e_lifecycle_stage">complete-mission</data>
121
+ <data key="e_disposition">Disrupted</data>
122
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
123
+ </edge>
124
+ <edge id="e3" source="8da0e140-2ea0-11ee-b96b-2b942769876e" target="HOST-2760">
125
+ <data key="e_type">INCIDENT_LINK</data>
126
+ <data key="e_timestamp">1714030280</data>
127
+ <data key="e_label_binary">malicious</data>
128
+ <data key="e_label_confidence">0.841796875</data>
129
+ <data key="e_suspicion_score">0.841796875</data>
130
+ <data key="e_mo_name">Data Theft</data>
131
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
132
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
133
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
134
+ <data key="e_lifecycle_stage">complete-mission</data>
135
+ <data key="e_disposition">Disrupted</data>
136
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
137
+ </edge>
138
+ <edge id="e4" source="HOST-2760" target="8da0e140-2ea0-11ee-b96b-2b942769876e">
139
+ <data key="e_type">INCIDENT_LINK</data>
140
+ <data key="e_timestamp">1714030280</data>
141
+ <data key="e_label_binary">malicious</data>
142
+ <data key="e_label_confidence">0.841796875</data>
143
+ <data key="e_suspicion_score">0.841796875</data>
144
+ <data key="e_mo_name">Data Theft</data>
145
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
146
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
147
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
148
+ <data key="e_lifecycle_stage">complete-mission</data>
149
+ <data key="e_disposition">Disrupted</data>
150
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
151
+ </edge>
152
+ <edge id="e5" source="960d8890-0625-11ee-87d2-5909d78e9e20" target="HOST-2760">
153
+ <data key="e_type">INCIDENT_LINK</data>
154
+ <data key="e_timestamp">1714030280</data>
155
+ <data key="e_label_binary">malicious</data>
156
+ <data key="e_label_confidence">0.841796875</data>
157
+ <data key="e_suspicion_score">0.841796875</data>
158
+ <data key="e_mo_name">Data Theft</data>
159
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
160
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
161
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
162
+ <data key="e_lifecycle_stage">complete-mission</data>
163
+ <data key="e_disposition">Disrupted</data>
164
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
165
+ </edge>
166
+ <edge id="e6" source="HOST-2760" target="960d8890-0625-11ee-87d2-5909d78e9e20">
167
+ <data key="e_type">INCIDENT_LINK</data>
168
+ <data key="e_timestamp">1714030280</data>
169
+ <data key="e_label_binary">malicious</data>
170
+ <data key="e_label_confidence">0.841796875</data>
171
+ <data key="e_suspicion_score">0.841796875</data>
172
+ <data key="e_mo_name">Data Theft</data>
173
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
174
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
175
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
176
+ <data key="e_lifecycle_stage">complete-mission</data>
177
+ <data key="e_disposition">Disrupted</data>
178
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
179
+ </edge>
180
+ <edge id="e7" source="41d232a3-1d39-11ee-9f21-d78f348ef256" target="HOST-2731">
181
+ <data key="e_type">INCIDENT_LINK</data>
182
+ <data key="e_timestamp">1714030280</data>
183
+ <data key="e_label_binary">malicious</data>
184
+ <data key="e_label_confidence">0.841796875</data>
185
+ <data key="e_suspicion_score">0.841796875</data>
186
+ <data key="e_mo_name">Data Theft</data>
187
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
188
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
189
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
190
+ <data key="e_lifecycle_stage">complete-mission</data>
191
+ <data key="e_disposition">Disrupted</data>
192
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
193
+ </edge>
194
+ <edge id="e8" source="HOST-2731" target="41d232a3-1d39-11ee-9f21-d78f348ef256">
195
+ <data key="e_type">INCIDENT_LINK</data>
196
+ <data key="e_timestamp">1714030280</data>
197
+ <data key="e_label_binary">malicious</data>
198
+ <data key="e_label_confidence">0.841796875</data>
199
+ <data key="e_suspicion_score">0.841796875</data>
200
+ <data key="e_mo_name">Data Theft</data>
201
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
202
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
203
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
204
+ <data key="e_lifecycle_stage">complete-mission</data>
205
+ <data key="e_disposition">Disrupted</data>
206
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
207
+ </edge>
208
+ <edge id="e9" source="0a7743b2-fbfd-11ee-9638-79602c101fad" target="HOST-2731">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1714030280</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.841796875</data>
213
+ <data key="e_suspicion_score">0.841796875</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Disrupted</data>
220
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
221
+ </edge>
222
+ <edge id="e10" source="HOST-2731" target="0a7743b2-fbfd-11ee-9638-79602c101fad">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1714030280</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.841796875</data>
227
+ <data key="e_suspicion_score">0.841796875</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Disrupted</data>
234
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
235
+ </edge>
236
+ <edge id="e11" source="32c98c60-4fd2-11ee-93eb-5f6ed73039b3" target="HOST-2760">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1714030280</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.841796875</data>
241
+ <data key="e_suspicion_score">0.841796875</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Disrupted</data>
248
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
249
+ </edge>
250
+ <edge id="e12" source="HOST-2760" target="32c98c60-4fd2-11ee-93eb-5f6ed73039b3">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1714030280</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.841796875</data>
255
+ <data key="e_suspicion_score">0.841796875</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Disrupted</data>
262
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
263
+ </edge>
264
+ <edge id="e13" source="8bc456f0-db24-11ee-9574-5d61046e1f61" target="HOST-2731">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1714030280</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.841796875</data>
269
+ <data key="e_suspicion_score">0.841796875</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Disrupted</data>
276
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
277
+ </edge>
278
+ <edge id="e14" source="HOST-2731" target="8bc456f0-db24-11ee-9574-5d61046e1f61">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1714030280</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.841796875</data>
283
+ <data key="e_suspicion_score">0.841796875</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Disrupted</data>
290
+ <data key="e_incident_id">cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b</data>
291
+ </edge>
292
+ </graph>
293
+ </graphml>
graph/incidents_graphml/c/cf9302c0-2d17-11ee-92ce-ad047e277e2c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.6.172</data>
35
+ <data key="n_hostname">172.31.6.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="609c2b54-0628-11ee-87d2-5909d78e9e20">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.49.126</data>
43
+ <data key="n_hostname">USER-0015-1381.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2757" target="609c2b54-0628-11ee-87d2-5909d78e9e20">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690529078</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf9302c0-2d17-11ee-92ce-ad047e277e2c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf96e620-1146-11ee-9a03-6507ae27d54b.graphml ADDED
@@ -0,0 +1,229 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="16c4ee01-0627-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.10.103</data>
35
+ <data key="n_hostname">100.64.10.103</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.168.229</data>
43
+ <data key="n_hostname">172.23.168.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="607eb1a0-06bf-11ee-94e3-230b825a7615">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.29.53</data>
51
+ <data key="n_hostname">100.64.29.53</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.29.158.1</data>
59
+ <data key="n_hostname">172.29.158.1</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.841796875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="1541e592-0629-11ee-b144-2b760827f5b0">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.21.149</data>
67
+ <data key="n_hostname">USER-0015-1235.example.internal</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="38472b60-062c-11ee-b596-cf17ed884c5d">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.27.59</data>
75
+ <data key="n_hostname">100.64.27.59</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="e7fdfef0-078d-11ee-a56d-9f8c27a88443">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.25.129</data>
83
+ <data key="n_hostname">100.64.25.129</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <edge id="e1" source="HOST-3162" target="HOST-2865">
89
+ <data key="e_type">INCIDENT_LINK</data>
90
+ <data key="e_timestamp">1687470632</data>
91
+ <data key="e_label_binary">malicious</data>
92
+ <data key="e_label_confidence">0.841796875</data>
93
+ <data key="e_suspicion_score">0.841796875</data>
94
+ <data key="e_mo_name">Data Theft</data>
95
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
96
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
97
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
98
+ <data key="e_lifecycle_stage">complete-mission</data>
99
+ <data key="e_disposition">Disrupted</data>
100
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
101
+ </edge>
102
+ <edge id="e2" source="HOST-2865" target="HOST-3162">
103
+ <data key="e_type">INCIDENT_LINK</data>
104
+ <data key="e_timestamp">1687470632</data>
105
+ <data key="e_label_binary">malicious</data>
106
+ <data key="e_label_confidence">0.841796875</data>
107
+ <data key="e_suspicion_score">0.841796875</data>
108
+ <data key="e_mo_name">Data Theft</data>
109
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
110
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
111
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
112
+ <data key="e_lifecycle_stage">complete-mission</data>
113
+ <data key="e_disposition">Disrupted</data>
114
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
115
+ </edge>
116
+ <edge id="e3" source="HOST-5776" target="HOST-2858">
117
+ <data key="e_type">INCIDENT_LINK</data>
118
+ <data key="e_timestamp">1687470632</data>
119
+ <data key="e_label_binary">malicious</data>
120
+ <data key="e_label_confidence">0.841796875</data>
121
+ <data key="e_suspicion_score">0.841796875</data>
122
+ <data key="e_mo_name">Data Theft</data>
123
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
124
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
125
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
126
+ <data key="e_lifecycle_stage">complete-mission</data>
127
+ <data key="e_disposition">Disrupted</data>
128
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
129
+ </edge>
130
+ <edge id="e4" source="HOST-2858" target="HOST-5776">
131
+ <data key="e_type">INCIDENT_LINK</data>
132
+ <data key="e_timestamp">1687470632</data>
133
+ <data key="e_label_binary">malicious</data>
134
+ <data key="e_label_confidence">0.841796875</data>
135
+ <data key="e_suspicion_score">0.841796875</data>
136
+ <data key="e_mo_name">Data Theft</data>
137
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
138
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
139
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
140
+ <data key="e_lifecycle_stage">complete-mission</data>
141
+ <data key="e_disposition">Disrupted</data>
142
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
143
+ </edge>
144
+ <edge id="e5" source="HOST-4845" target="HOST-2858">
145
+ <data key="e_type">INCIDENT_LINK</data>
146
+ <data key="e_timestamp">1687470632</data>
147
+ <data key="e_label_binary">malicious</data>
148
+ <data key="e_label_confidence">0.841796875</data>
149
+ <data key="e_suspicion_score">0.841796875</data>
150
+ <data key="e_mo_name">Data Theft</data>
151
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
152
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
153
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
154
+ <data key="e_lifecycle_stage">complete-mission</data>
155
+ <data key="e_disposition">Disrupted</data>
156
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
157
+ </edge>
158
+ <edge id="e6" source="HOST-2858" target="HOST-4845">
159
+ <data key="e_type">INCIDENT_LINK</data>
160
+ <data key="e_timestamp">1687470632</data>
161
+ <data key="e_label_binary">malicious</data>
162
+ <data key="e_label_confidence">0.841796875</data>
163
+ <data key="e_suspicion_score">0.841796875</data>
164
+ <data key="e_mo_name">Data Theft</data>
165
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
166
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
167
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
168
+ <data key="e_lifecycle_stage">complete-mission</data>
169
+ <data key="e_disposition">Disrupted</data>
170
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
171
+ </edge>
172
+ <edge id="e7" source="HOST-5475" target="HOST-2858">
173
+ <data key="e_type">INCIDENT_LINK</data>
174
+ <data key="e_timestamp">1687470632</data>
175
+ <data key="e_label_binary">malicious</data>
176
+ <data key="e_label_confidence">0.841796875</data>
177
+ <data key="e_suspicion_score">0.841796875</data>
178
+ <data key="e_mo_name">Data Theft</data>
179
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
180
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
181
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
182
+ <data key="e_lifecycle_stage">complete-mission</data>
183
+ <data key="e_disposition">Disrupted</data>
184
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
185
+ </edge>
186
+ <edge id="e8" source="HOST-2858" target="HOST-5475">
187
+ <data key="e_type">INCIDENT_LINK</data>
188
+ <data key="e_timestamp">1687470632</data>
189
+ <data key="e_label_binary">malicious</data>
190
+ <data key="e_label_confidence">0.841796875</data>
191
+ <data key="e_suspicion_score">0.841796875</data>
192
+ <data key="e_mo_name">Data Theft</data>
193
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
194
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
195
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
196
+ <data key="e_lifecycle_stage">complete-mission</data>
197
+ <data key="e_disposition">Disrupted</data>
198
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
199
+ </edge>
200
+ <edge id="e9" source="HOST-2858" target="HOST-5754">
201
+ <data key="e_type">INCIDENT_LINK</data>
202
+ <data key="e_timestamp">1687470632</data>
203
+ <data key="e_label_binary">malicious</data>
204
+ <data key="e_label_confidence">0.841796875</data>
205
+ <data key="e_suspicion_score">0.841796875</data>
206
+ <data key="e_mo_name">Data Theft</data>
207
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
208
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
209
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
210
+ <data key="e_lifecycle_stage">complete-mission</data>
211
+ <data key="e_disposition">Disrupted</data>
212
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
213
+ </edge>
214
+ <edge id="e10" source="HOST-5754" target="HOST-2858">
215
+ <data key="e_type">INCIDENT_LINK</data>
216
+ <data key="e_timestamp">1687470632</data>
217
+ <data key="e_label_binary">malicious</data>
218
+ <data key="e_label_confidence">0.841796875</data>
219
+ <data key="e_suspicion_score">0.841796875</data>
220
+ <data key="e_mo_name">Data Theft</data>
221
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
222
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
223
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
224
+ <data key="e_lifecycle_stage">complete-mission</data>
225
+ <data key="e_disposition">Disrupted</data>
226
+ <data key="e_incident_id">cf96e620-1146-11ee-9a03-6507ae27d54b</data>
227
+ </edge>
228
+ </graph>
229
+ </graphml>
graph/incidents_graphml/c/cf9bab80-4af6-11ee-adcb-67c31ebac50c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2dda7704-0626-11ee-ad3e-fda0da874cab">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.22.79</data>
43
+ <data key="n_hostname">100.64.22.79</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-4788">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693813440</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cf9bab80-4af6-11ee-adcb-67c31ebac50c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cf9bf5d0-7e8c-11ee-b44e-cd55abd836ec.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.23.117</data>
35
+ <data key="n_hostname">172.26.23.117</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0fd5f310-063f-11ee-bee5-75367837c358">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.32.13</data>
43
+ <data key="n_hostname">100.64.32.13</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2824" target="HOST-6154">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699485373</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cf9bf5d0-7e8c-11ee-b44e-cd55abd836ec</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cfUSER-140380-5b8b-11ee-9925-ebc6745d6541.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a123e723-5840-11ee-97a8-ef0e1d4cff17">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.44</data>
43
+ <data key="n_hostname">100.64.18.44</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="a123e723-5840-11ee-97a8-ef0e1d4cff17">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695636652</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cfUSER-140380-5b8b-11ee-9925-ebc6745d6541</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cfa3ae80-2dc6-11ef-976a-4f91a87d18f6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d434d283-2c1d-11ef-91f1-359cfd948649">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="04f4bc31-29d7-11ef-83b4-513ef1946ce2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.86.74</data>
43
+ <data key="n_hostname">USER-0015-1978.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="d434d283-2c1d-11ef-91f1-359cfd948649" target="04f4bc31-29d7-11ef-83b4-513ef1946ce2">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1718751738</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cfa3ae80-2dc6-11ef-976a-4f91a87d18f6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cfac4980-7e8c-11ee-b44e-cd55abd836ec.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="18b6bb40-2f4d-11ee-a48d-63ec288f32e6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.21.21</data>
35
+ <data key="n_hostname">100.64.21.21</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.73.92</data>
43
+ <data key="n_hostname">172.26.73.92</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4611" target="HOST-2724">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699485374</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cfac4980-7e8c-11ee-b44e-cd55abd836ec</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cfacb810-1146-11ee-9a03-6507ae27d54b.graphml ADDED
@@ -0,0 +1,193 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e6c45be1-062c-11ee-8d73-ffc5210658ae">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.252</data>
35
+ <data key="n_hostname">100.64.27.252</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.21.61.66</data>
43
+ <data key="n_hostname">172.21.61.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="f70b1060-0628-11ee-a48a-ff0b3de2e266">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.10.101</data>
51
+ <data key="n_hostname">100.64.10.101</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="e0da2590-062a-11ee-87d2-5909d78e9e20">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.18.165</data>
59
+ <data key="n_hostname">100.64.18.165</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.31.6.172</data>
67
+ <data key="n_hostname">172.31.6.172</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="7077a7a0-0634-11ee-b053-713cb8d9e770">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.50.86</data>
75
+ <data key="n_hostname">100.64.50.86</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <edge id="e1" source="e6c45be1-062c-11ee-8d73-ffc5210658ae" target="HOST-2709">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1687470632</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.7</data>
85
+ <data key="e_suspicion_score">0.25</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Unprocessed</data>
92
+ <data key="e_incident_id">cfacb810-1146-11ee-9a03-6507ae27d54b</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-2709" target="e6c45be1-062c-11ee-8d73-ffc5210658ae">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1687470632</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.7</data>
99
+ <data key="e_suspicion_score">0.25</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Unprocessed</data>
106
+ <data key="e_incident_id">cfacb810-1146-11ee-9a03-6507ae27d54b</data>
107
+ </edge>
108
+ <edge id="e3" source="HOST-3161" target="HOST-2709">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1687470632</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.7</data>
113
+ <data key="e_suspicion_score">0.25</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Unprocessed</data>
120
+ <data key="e_incident_id">cfacb810-1146-11ee-9a03-6507ae27d54b</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-2709" target="HOST-3161">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1687470632</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.7</data>
127
+ <data key="e_suspicion_score">0.25</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Unprocessed</data>
134
+ <data key="e_incident_id">cfacb810-1146-11ee-9a03-6507ae27d54b</data>
135
+ </edge>
136
+ <edge id="e5" source="HOST-4279" target="HOST-2757">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1687470632</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.7</data>
141
+ <data key="e_suspicion_score">0.25</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Unprocessed</data>
148
+ <data key="e_incident_id">cfacb810-1146-11ee-9a03-6507ae27d54b</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-2757" target="HOST-4279">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1687470632</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.7</data>
155
+ <data key="e_suspicion_score">0.25</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Unprocessed</data>
162
+ <data key="e_incident_id">cfacb810-1146-11ee-9a03-6507ae27d54b</data>
163
+ </edge>
164
+ <edge id="e7" source="7077a7a0-0634-11ee-b053-713cb8d9e770" target="HOST-2757">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1687470632</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.7</data>
169
+ <data key="e_suspicion_score">0.25</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Unprocessed</data>
176
+ <data key="e_incident_id">cfacb810-1146-11ee-9a03-6507ae27d54b</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-2757" target="7077a7a0-0634-11ee-b053-713cb8d9e770">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1687470632</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.7</data>
183
+ <data key="e_suspicion_score">0.25</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Unprocessed</data>
190
+ <data key="e_incident_id">cfacb810-1146-11ee-9a03-6507ae27d54b</data>
191
+ </edge>
192
+ </graph>
193
+ </graphml>
graph/incidents_graphml/c/cfb03aa0-3245-11ef-9bb6-5bd0425d571b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="07f28d90-2900-11ef-9c4f-074efb30849a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.59.91</data>
35
+ <data key="n_hostname">172.30.59.91</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="8ef5d5b6-2921-11ef-b087-7b5d65d6ef87">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.86.207</data>
43
+ <data key="n_hostname">100.64.86.207</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="07f28d90-2900-11ef-9c4f-074efb30849a" target="8ef5d5b6-2921-11ef-b087-7b5d65d6ef87">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1719246089</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cfb03aa0-3245-11ef-9bb6-5bd0425d571b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63.graphml ADDED
@@ -0,0 +1,257 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="37e66ea1-1da2-11ee-8142-a72184c5c133">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.134</data>
35
+ <data key="n_hostname">100.64.70.134</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.905078125</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="3e1a77f7-0626-11ee-a31e-2bbd16ce2d59">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.65</data>
43
+ <data key="n_hostname">100.64.68.65</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="604b7aab-0625-11ee-a31e-2bbd16ce2d59">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.48.7</data>
51
+ <data key="n_hostname">100.64.48.7</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.49375</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.68.23</data>
59
+ <data key="n_hostname">100.64.68.23</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.746875</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <node id="abdd4cac-3820-11ee-a41d-074e8e759095">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.70.135</data>
67
+ <data key="n_hostname">100.64.70.135</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.49375</data>
70
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
71
+ </node>
72
+ <node id="4887b048-0626-11ee-b0df-0ffd69bf48e8">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.4.233</data>
75
+ <data key="n_hostname">100.64.4.233</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.6625</data>
78
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
79
+ </node>
80
+ <node id="5e2f7c39-34fb-11ee-95d5-d70ee62f66ac">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.70.136</data>
83
+ <data key="n_hostname">100.64.70.136</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.49375</data>
86
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
87
+ </node>
88
+ <edge id="e1" source="37e66ea1-1da2-11ee-8142-a72184c5c133" target="HOST-11454">
89
+ <data key="e_type">INCIDENT_LINK</data>
90
+ <data key="e_timestamp">1691744554</data>
91
+ <data key="e_label_binary">malicious</data>
92
+ <data key="e_label_confidence">0.905078125</data>
93
+ <data key="e_suspicion_score">0.905078125</data>
94
+ <data key="e_mo_name">Data Theft</data>
95
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
96
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
97
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
98
+ <data key="e_lifecycle_stage">complete-mission</data>
99
+ <data key="e_disposition">Disrupted</data>
100
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
101
+ </edge>
102
+ <edge id="e2" source="HOST-11454" target="37e66ea1-1da2-11ee-8142-a72184c5c133">
103
+ <data key="e_type">INCIDENT_LINK</data>
104
+ <data key="e_timestamp">1691744554</data>
105
+ <data key="e_label_binary">malicious</data>
106
+ <data key="e_label_confidence">0.905078125</data>
107
+ <data key="e_suspicion_score">0.905078125</data>
108
+ <data key="e_mo_name">Data Theft</data>
109
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
110
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
111
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
112
+ <data key="e_lifecycle_stage">complete-mission</data>
113
+ <data key="e_disposition">Disrupted</data>
114
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
115
+ </edge>
116
+ <edge id="e3" source="HOST-12202" target="HOST-11393">
117
+ <data key="e_type">INCIDENT_LINK</data>
118
+ <data key="e_timestamp">1691744554</data>
119
+ <data key="e_label_binary">malicious</data>
120
+ <data key="e_label_confidence">0.905078125</data>
121
+ <data key="e_suspicion_score">0.905078125</data>
122
+ <data key="e_mo_name">Data Theft</data>
123
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
124
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
125
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
126
+ <data key="e_lifecycle_stage">complete-mission</data>
127
+ <data key="e_disposition">Disrupted</data>
128
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
129
+ </edge>
130
+ <edge id="e4" source="HOST-11393" target="HOST-12202">
131
+ <data key="e_type">INCIDENT_LINK</data>
132
+ <data key="e_timestamp">1691744554</data>
133
+ <data key="e_label_binary">malicious</data>
134
+ <data key="e_label_confidence">0.905078125</data>
135
+ <data key="e_suspicion_score">0.905078125</data>
136
+ <data key="e_mo_name">Data Theft</data>
137
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
138
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
139
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
140
+ <data key="e_lifecycle_stage">complete-mission</data>
141
+ <data key="e_disposition">Disrupted</data>
142
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
143
+ </edge>
144
+ <edge id="e5" source="abdd4cac-3820-11ee-a41d-074e8e759095" target="HOST-11393">
145
+ <data key="e_type">INCIDENT_LINK</data>
146
+ <data key="e_timestamp">1691744554</data>
147
+ <data key="e_label_binary">malicious</data>
148
+ <data key="e_label_confidence">0.905078125</data>
149
+ <data key="e_suspicion_score">0.905078125</data>
150
+ <data key="e_mo_name">Data Theft</data>
151
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
152
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
153
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
154
+ <data key="e_lifecycle_stage">complete-mission</data>
155
+ <data key="e_disposition">Disrupted</data>
156
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
157
+ </edge>
158
+ <edge id="e6" source="HOST-11393" target="abdd4cac-3820-11ee-a41d-074e8e759095">
159
+ <data key="e_type">INCIDENT_LINK</data>
160
+ <data key="e_timestamp">1691744554</data>
161
+ <data key="e_label_binary">malicious</data>
162
+ <data key="e_label_confidence">0.905078125</data>
163
+ <data key="e_suspicion_score">0.905078125</data>
164
+ <data key="e_mo_name">Data Theft</data>
165
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
166
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
167
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
168
+ <data key="e_lifecycle_stage">complete-mission</data>
169
+ <data key="e_disposition">Disrupted</data>
170
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
171
+ </edge>
172
+ <edge id="e7" source="37e66ea1-1da2-11ee-8142-a72184c5c133" target="HOST-11393">
173
+ <data key="e_type">INCIDENT_LINK</data>
174
+ <data key="e_timestamp">1691744554</data>
175
+ <data key="e_label_binary">malicious</data>
176
+ <data key="e_label_confidence">0.905078125</data>
177
+ <data key="e_suspicion_score">0.905078125</data>
178
+ <data key="e_mo_name">Data Theft</data>
179
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
180
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
181
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
182
+ <data key="e_lifecycle_stage">complete-mission</data>
183
+ <data key="e_disposition">Disrupted</data>
184
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
185
+ </edge>
186
+ <edge id="e8" source="HOST-11393" target="37e66ea1-1da2-11ee-8142-a72184c5c133">
187
+ <data key="e_type">INCIDENT_LINK</data>
188
+ <data key="e_timestamp">1691744554</data>
189
+ <data key="e_label_binary">malicious</data>
190
+ <data key="e_label_confidence">0.905078125</data>
191
+ <data key="e_suspicion_score">0.905078125</data>
192
+ <data key="e_mo_name">Data Theft</data>
193
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
194
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
195
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
196
+ <data key="e_lifecycle_stage">complete-mission</data>
197
+ <data key="e_disposition">Disrupted</data>
198
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
199
+ </edge>
200
+ <edge id="e9" source="4887b048-0626-11ee-b0df-0ffd69bf48e8" target="HOST-11454">
201
+ <data key="e_type">INCIDENT_LINK</data>
202
+ <data key="e_timestamp">1691744554</data>
203
+ <data key="e_label_binary">malicious</data>
204
+ <data key="e_label_confidence">0.905078125</data>
205
+ <data key="e_suspicion_score">0.905078125</data>
206
+ <data key="e_mo_name">Data Theft</data>
207
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
208
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
209
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
210
+ <data key="e_lifecycle_stage">complete-mission</data>
211
+ <data key="e_disposition">Disrupted</data>
212
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
213
+ </edge>
214
+ <edge id="e10" source="HOST-11454" target="4887b048-0626-11ee-b0df-0ffd69bf48e8">
215
+ <data key="e_type">INCIDENT_LINK</data>
216
+ <data key="e_timestamp">1691744554</data>
217
+ <data key="e_label_binary">malicious</data>
218
+ <data key="e_label_confidence">0.905078125</data>
219
+ <data key="e_suspicion_score">0.905078125</data>
220
+ <data key="e_mo_name">Data Theft</data>
221
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
222
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
223
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
224
+ <data key="e_lifecycle_stage">complete-mission</data>
225
+ <data key="e_disposition">Disrupted</data>
226
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
227
+ </edge>
228
+ <edge id="e11" source="5e2f7c39-34fb-11ee-95d5-d70ee62f66ac" target="HOST-11393">
229
+ <data key="e_type">INCIDENT_LINK</data>
230
+ <data key="e_timestamp">1691744554</data>
231
+ <data key="e_label_binary">malicious</data>
232
+ <data key="e_label_confidence">0.905078125</data>
233
+ <data key="e_suspicion_score">0.905078125</data>
234
+ <data key="e_mo_name">Data Theft</data>
235
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
236
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
237
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
238
+ <data key="e_lifecycle_stage">complete-mission</data>
239
+ <data key="e_disposition">Disrupted</data>
240
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
241
+ </edge>
242
+ <edge id="e12" source="HOST-11393" target="5e2f7c39-34fb-11ee-95d5-d70ee62f66ac">
243
+ <data key="e_type">INCIDENT_LINK</data>
244
+ <data key="e_timestamp">1691744554</data>
245
+ <data key="e_label_binary">malicious</data>
246
+ <data key="e_label_confidence">0.905078125</data>
247
+ <data key="e_suspicion_score">0.905078125</data>
248
+ <data key="e_mo_name">Data Theft</data>
249
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
250
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
251
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
252
+ <data key="e_lifecycle_stage">complete-mission</data>
253
+ <data key="e_disposition">Disrupted</data>
254
+ <data key="e_incident_id">cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63</data>
255
+ </edge>
256
+ </graph>
257
+ </graphml>
graph/incidents_graphml/c/cfb570f0-31cf-11ee-98fc-ffc5d40cae26.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c4912d00-07f3-11ee-810f-3ba46fac49e2">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.56.218</data>
35
+ <data key="n_hostname">100.64.56.218</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.21.61.66</data>
43
+ <data key="n_hostname">172.21.61.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="c4912d00-07f3-11ee-810f-3ba46fac49e2" target="HOST-2709">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691047910</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cfb570f0-31cf-11ee-98fc-ffc5d40cae26</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cfc6b8b0-ff26-11ec-890e-b9233ab766d3.graphml ADDED
@@ -0,0 +1,171 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="660ec983-ec1b-11ec-9175-87db28d1a712">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.93</data>
35
+ <data key="n_hostname">100.64.76.93</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.89453125</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="8d83ddb5-eb3b-11ec-9cae-df39711dd4d8">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.72.217</data>
51
+ <data key="n_hostname">100.64.72.217</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="7949b080-ea92-11ec-abf7-619673fe2558">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.72.235</data>
59
+ <data key="n_hostname">100.64.72.235</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.841796875</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="8a5944f1-eb2b-11ec-8259-293053cf341c">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.4.64</data>
67
+ <data key="n_hostname">100.64.4.64</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.9634375</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <edge id="e1" source="660ec983-ec1b-11ec-9175-87db28d1a712" target="HOST-12604">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1657330270</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.9634375</data>
77
+ <data key="e_suspicion_score">0.9634375</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Disrupted</data>
84
+ <data key="e_incident_id">cfc6b8b0-ff26-11ec-890e-b9233ab766d3</data>
85
+ </edge>
86
+ <edge id="e2" source="8d83ddb5-eb3b-11ec-9cae-df39711dd4d8" target="7949b080-ea92-11ec-abf7-619673fe2558">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1657330270</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.9634375</data>
91
+ <data key="e_suspicion_score">0.9634375</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Disrupted</data>
98
+ <data key="e_incident_id">cfc6b8b0-ff26-11ec-890e-b9233ab766d3</data>
99
+ </edge>
100
+ <edge id="e3" source="7949b080-ea92-11ec-abf7-619673fe2558" target="8d83ddb5-eb3b-11ec-9cae-df39711dd4d8">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1657330270</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.9634375</data>
105
+ <data key="e_suspicion_score">0.9634375</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Disrupted</data>
112
+ <data key="e_incident_id">cfc6b8b0-ff26-11ec-890e-b9233ab766d3</data>
113
+ </edge>
114
+ <edge id="e4" source="8a5944f1-eb2b-11ec-8259-293053cf341c" target="7949b080-ea92-11ec-abf7-619673fe2558">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1657330270</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.9634375</data>
119
+ <data key="e_suspicion_score">0.9634375</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Disrupted</data>
126
+ <data key="e_incident_id">cfc6b8b0-ff26-11ec-890e-b9233ab766d3</data>
127
+ </edge>
128
+ <edge id="e5" source="7949b080-ea92-11ec-abf7-619673fe2558" target="8a5944f1-eb2b-11ec-8259-293053cf341c">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1657330270</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.9634375</data>
133
+ <data key="e_suspicion_score">0.9634375</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">cfc6b8b0-ff26-11ec-890e-b9233ab766d3</data>
141
+ </edge>
142
+ <edge id="e6" source="660ec983-ec1b-11ec-9175-87db28d1a712" target="7949b080-ea92-11ec-abf7-619673fe2558">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1657330270</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.9634375</data>
147
+ <data key="e_suspicion_score">0.9634375</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">cfc6b8b0-ff26-11ec-890e-b9233ab766d3</data>
155
+ </edge>
156
+ <edge id="e7" source="7949b080-ea92-11ec-abf7-619673fe2558" target="660ec983-ec1b-11ec-9175-87db28d1a712">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1657330270</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.9634375</data>
161
+ <data key="e_suspicion_score">0.9634375</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">cfc6b8b0-ff26-11ec-890e-b9233ab766d3</data>
169
+ </edge>
170
+ </graph>
171
+ </graphml>
graph/incidents_graphml/c/cfcb9320-f381-11ee-b9e4-ef5a54940d7a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.40.149</data>
35
+ <data key="n_hostname">172.29.40.149</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c37fd510-0627-11ee-a360-0d0424c09388">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.15.185</data>
43
+ <data key="n_hostname">100.64.15.185</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2834" target="HOST-3890">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1712344935</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">cfcb9320-f381-11ee-b9e4-ef5a54940d7a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/cfd55500-31cf-11ee-98fc-ffc5d40cae26.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.21.61.66</data>
35
+ <data key="n_hostname">172.21.61.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c4912d00-07f3-11ee-810f-3ba46fac49e2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.56.218</data>
43
+ <data key="n_hostname">100.64.56.218</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2709" target="HOST-9716">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691047911</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">cfd55500-31cf-11ee-98fc-ffc5d40cae26</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>