diff --git a/graph/incidents_graphml/c/cf276970-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/c/cf276970-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d0d5e960f5361c688d4dfad015262bb1b459267 --- /dev/null +++ b/graph/incidents_graphml/c/cf276970-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.38 + 100.64.53.38 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672924 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf276970-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/c/cf283820-10d6-11ef-8c06-93e20871a0e5.graphml b/graph/incidents_graphml/c/cf283820-10d6-11ef-8c06-93e20871a0e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d6bd5132839a1120fae8c8b8076734c9af86cfc --- /dev/null +++ b/graph/incidents_graphml/c/cf283820-10d6-11ef-8c06-93e20871a0e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.11 + 100.64.25.11 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715570025 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf283820-10d6-11ef-8c06-93e20871a0e5 + + + diff --git a/graph/incidents_graphml/c/cf3394f0-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cf3394f0-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..132f677266a2dbbdd7be5ece24f9456d0c522571 --- /dev/null +++ b/graph/incidents_graphml/c/cf3394f0-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.247 + 100.64.13.247 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636653 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf3394f0-5b8b-11ee-9925-ebc6745d6541 + + + diff --git a/graph/incidents_graphml/c/cf394f20-10d6-11ef-8c06-93e20871a0e5.graphml b/graph/incidents_graphml/c/cf394f20-10d6-11ef-8c06-93e20871a0e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5e6ef83a15cd0f8354da30ea4db5237f55526be --- /dev/null +++ b/graph/incidents_graphml/c/cf394f20-10d6-11ef-8c06-93e20871a0e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.11 + 100.64.25.11 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715570025 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf394f20-10d6-11ef-8c06-93e20871a0e5 + + + diff --git a/graph/incidents_graphml/c/cf3a3800-5fe6-11ee-80e7-7732713cc006.graphml b/graph/incidents_graphml/c/cf3a3800-5fe6-11ee-80e7-7732713cc006.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09877cabee20222e07dee838ad4479d7631bfeed --- /dev/null +++ b/graph/incidents_graphml/c/cf3a3800-5fe6-11ee-80e7-7732713cc006.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.40 + 100.64.16.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696115541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cf3a3800-5fe6-11ee-80e7-7732713cc006 + + + diff --git a/graph/incidents_graphml/c/cf422d90-2dc6-11ef-976a-4f91a87d18f6.graphml b/graph/incidents_graphml/c/cf422d90-2dc6-11ef-976a-4f91a87d18f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc1d4148720984b61d79d690aa15630795d2339d --- /dev/null +++ b/graph/incidents_graphml/c/cf422d90-2dc6-11ef-976a-4f91a87d18f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.5 + 100.64.81.5 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718751737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf422d90-2dc6-11ef-976a-4f91a87d18f6 + + + diff --git a/graph/incidents_graphml/c/cf468a30-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/c/cf468a30-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e6ea2e146e9637c105ae3bca276f85bd0f17f72 --- /dev/null +++ b/graph/incidents_graphml/c/cf468a30-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.38 + 100.64.53.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672924 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf468a30-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/c/cf4966e0-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cf4966e0-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c7435ff8e7c80a21e67a4778860ae86d4a23781 --- /dev/null +++ b/graph/incidents_graphml/c/cf4966e0-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.247 + 100.64.13.247 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636653 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf4966e0-5b8b-11ee-9925-ebc6745d6541 + + + diff --git a/graph/incidents_graphml/c/cf49b720-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/c/cf49b720-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f573e9011d8ce94b2c59ed9bf3e99f14c56f7686 --- /dev/null +++ b/graph/incidents_graphml/c/cf49b720-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.9 + 100.64.32.9 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485373 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cf49b720-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/c/cf4cfcb0-5fe6-11ee-80e7-7732713cc006.graphml b/graph/incidents_graphml/c/cf4cfcb0-5fe6-11ee-80e7-7732713cc006.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a2cb675f35452a889aff1aa55b3da0ccc89c266 --- /dev/null +++ b/graph/incidents_graphml/c/cf4cfcb0-5fe6-11ee-80e7-7732713cc006.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.42 + 100.64.16.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696115542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf4cfcb0-5fe6-11ee-80e7-7732713cc006 + + + diff --git a/graph/incidents_graphml/c/cf5bf720-2dc6-11ef-976a-4f91a87d18f6.graphml b/graph/incidents_graphml/c/cf5bf720-2dc6-11ef-976a-4f91a87d18f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14cb89694cea205daa02498fecee828eff894659 --- /dev/null +++ b/graph/incidents_graphml/c/cf5bf720-2dc6-11ef-976a-4f91a87d18f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.81.5 + 100.64.81.5 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718751737 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf5bf720-2dc6-11ef-976a-4f91a87d18f6 + + + diff --git a/graph/incidents_graphml/c/cf5c3ef0-5fe6-11ee-80e7-7732713cc006.graphml b/graph/incidents_graphml/c/cf5c3ef0-5fe6-11ee-80e7-7732713cc006.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3243a90efb107e630dcf6682bec75a181873b985 --- /dev/null +++ b/graph/incidents_graphml/c/cf5c3ef0-5fe6-11ee-80e7-7732713cc006.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.42 + 100.64.16.42 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696115542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf5c3ef0-5fe6-11ee-80e7-7732713cc006 + + + diff --git a/graph/incidents_graphml/c/cf5d8cc0-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/c/cf5d8cc0-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38a25e8cc1de8e8e29cb2758491340b8ec3d5cb5 --- /dev/null +++ b/graph/incidents_graphml/c/cf5d8cc0-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.99 + 100.64.85.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673583714 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf5d8cc0-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/c/cf5db450-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/c/cf5db450-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a41525ced77fbea2d2ada73a5c95c86cdd5f7b2c --- /dev/null +++ b/graph/incidents_graphml/c/cf5db450-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.9 + 100.64.32.9 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf5db450-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/c/cf5f4250-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/c/cf5f4250-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..867933554e9f120e009634ce5e9b6442be3c0061 --- /dev/null +++ b/graph/incidents_graphml/c/cf5f4250-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf5f4250-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/c/cf613cd0-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/cf613cd0-89bb-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da5cbbe37388d18f0f8877c8284a0288adec242e --- /dev/null +++ b/graph/incidents_graphml/c/cf613cd0-89bb-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.86 + 100.64.65.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700715022 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf613cd0-89bb-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/c/cf624610-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cf624610-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..740cf31212d922deee700b8b6a855201a87cb41e --- /dev/null +++ b/graph/incidents_graphml/c/cf624610-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.48 + 100.64.18.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636653 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cf624610-5b8b-11ee-9925-ebc6745d6541 + + + diff --git a/graph/incidents_graphml/c/cf62ac80-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/cf62ac80-4ceb-11ee-b223-133fe64c82b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0e0b117414964e808bc9303912cddd9af981fbf --- /dev/null +++ b/graph/incidents_graphml/c/cf62ac80-4ceb-11ee-b223-133fe64c82b5.graphml @@ -0,0 +1,793 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.124 + 100.64.36.124 + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.125 + 100.64.36.125 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.126 + 100.64.36.126 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.127 + 100.64.36.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.128 + 100.64.36.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.129 + 100.64.36.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.101 + 100.64.26.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.130 + 100.64.36.130 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.131 + 100.64.36.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.132 + 100.64.36.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.133 + 100.64.36.133 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.134 + 100.64.36.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.103 + 100.64.10.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.135 + 100.64.36.135 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.136 + 100.64.36.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.137 + 100.64.36.137 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + INCIDENT_LINK + 1694028617 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf62ac80-4ceb-11ee-b223-133fe64c82b5 + + + diff --git a/graph/incidents_graphml/c/cf62e3f0-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/c/cf62e3f0-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..677c7db4d265e627c99b365b6b6e263d0125dd65 --- /dev/null +++ b/graph/incidents_graphml/c/cf62e3f0-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.99 + 100.64.85.99 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673583714 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf62e3f0-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/c/cf69d380-5fe6-11ee-80e7-7732713cc006.graphml b/graph/incidents_graphml/c/cf69d380-5fe6-11ee-80e7-7732713cc006.graphml new file mode 100644 index 0000000000000000000000000000000000000000..964ac62155217ea257049ffc250a842f773f4833 --- /dev/null +++ b/graph/incidents_graphml/c/cf69d380-5fe6-11ee-80e7-7732713cc006.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696115542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf69d380-5fe6-11ee-80e7-7732713cc006 + + + diff --git a/graph/incidents_graphml/c/cf69e8d0-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/c/cf69e8d0-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..732c384851a6a0ac146753b9f10664a111bdd255 --- /dev/null +++ b/graph/incidents_graphml/c/cf69e8d0-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.78 + 100.64.68.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673583714 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf69e8d0-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/c/cf6a7c90-f84f-11ec-8cad-d3b902a073da.graphml b/graph/incidents_graphml/c/cf6a7c90-f84f-11ec-8cad-d3b902a073da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a367825871e02f96cafca17e27f8fed8310757b --- /dev/null +++ b/graph/incidents_graphml/c/cf6a7c90-f84f-11ec-8cad-d3b902a073da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.247 + USER-0015-1608.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.248 + 100.64.70.248 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656578220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf6a7c90-f84f-11ec-8cad-d3b902a073da + + + diff --git a/graph/incidents_graphml/c/cf6c3340-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/c/cf6c3340-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0abd0c79ed3f07df23b0260cb23ff42a36c9b91c --- /dev/null +++ b/graph/incidents_graphml/c/cf6c3340-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.11 + 100.64.32.11 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485373 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf6c3340-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/c/cf6fdc40-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/c/cf6fdc40-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d4cf679710d349ab97c67321c936cbba6c82c53 --- /dev/null +++ b/graph/incidents_graphml/c/cf6fdc40-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.68.78 + 100.64.68.78 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673583714 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf6fdc40-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/c/cf722cc0-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/cf722cc0-89bb-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e99caecb99aed890a9c52b480a32ea589dd1666a --- /dev/null +++ b/graph/incidents_graphml/c/cf722cc0-89bb-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.112 + 100.64.16.112 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700715022 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf722cc0-89bb-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/c/cf787980-5fe6-11ee-80e7-7732713cc006.graphml b/graph/incidents_graphml/c/cf787980-5fe6-11ee-80e7-7732713cc006.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cb47403dc2d9ac58f1f6c4c0b83ead17d6c377b --- /dev/null +++ b/graph/incidents_graphml/c/cf787980-5fe6-11ee-80e7-7732713cc006.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696115542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf787980-5fe6-11ee-80e7-7732713cc006 + + + diff --git a/graph/incidents_graphml/c/cf798fe0-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/cf798fe0-4ceb-11ee-b223-133fe64c82b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c3af7bfef6d0b6bd123f1432baec470cc0dd35e --- /dev/null +++ b/graph/incidents_graphml/c/cf798fe0-4ceb-11ee-b223-133fe64c82b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.124 + 100.64.36.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694028617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf798fe0-4ceb-11ee-b223-133fe64c82b5 + + + diff --git a/graph/incidents_graphml/c/cf7a0d20-4423-11ed-8338-1b551ccaa997.graphml b/graph/incidents_graphml/c/cf7a0d20-4423-11ed-8338-1b551ccaa997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b21f41e5352c6caecab13b1a34d4ed0a26208a87 --- /dev/null +++ b/graph/incidents_graphml/c/cf7a0d20-4423-11ed-8338-1b551ccaa997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.43 + 100.64.72.43 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1664915611 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf7a0d20-4423-11ed-8338-1b551ccaa997 + + + diff --git a/graph/incidents_graphml/c/cf7bc3a0-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/c/cf7bc3a0-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8490524d1f1a13af18d7b781883679628b175c9 --- /dev/null +++ b/graph/incidents_graphml/c/cf7bc3a0-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.11 + 100.64.32.11 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485373 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf7bc3a0-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/c/cf80a970-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/c/cf80a970-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55d6ba50af20a40e0c90c1c228ab1dead1e38f22 --- /dev/null +++ b/graph/incidents_graphml/c/cf80a970-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.55 + 100.64.50.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813439 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf80a970-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/c/cf80ad00-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/c/cf80ad00-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..194dd36ecc6f27d2fdfe914d87d593a678a4b8b2 --- /dev/null +++ b/graph/incidents_graphml/c/cf80ad00-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672925 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf80ad00-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/c/cf82a780-89bb-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/c/cf82a780-89bb-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b047c2a854e58597d814021f5461af20d3d105be --- /dev/null +++ b/graph/incidents_graphml/c/cf82a780-89bb-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.112 + 100.64.16.112 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700715022 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf82a780-89bb-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/c/cf848bc0-2ff4-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/c/cf848bc0-2ff4-11ee-b00f-c1ca007fb916.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4be993b9074c08ae9cb2830a7f60d0e76bc2623d --- /dev/null +++ b/graph/incidents_graphml/c/cf848bc0-2ff4-11ee-b00f-c1ca007fb916.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.19.238 + 100.64.19.238 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.18.74 + 100.64.18.74 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1690843899 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf848bc0-2ff4-11ee-b00f-c1ca007fb916 + + + INCIDENT_LINK + 1690843899 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf848bc0-2ff4-11ee-b00f-c1ca007fb916 + + + INCIDENT_LINK + 1690843899 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf848bc0-2ff4-11ee-b00f-c1ca007fb916 + + + INCIDENT_LINK + 1690843899 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf848bc0-2ff4-11ee-b00f-c1ca007fb916 + + + INCIDENT_LINK + 1690843899 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf848bc0-2ff4-11ee-b00f-c1ca007fb916 + + + INCIDENT_LINK + 1690843899 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf848bc0-2ff4-11ee-b00f-c1ca007fb916 + + + INCIDENT_LINK + 1690843899 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf848bc0-2ff4-11ee-b00f-c1ca007fb916 + + + INCIDENT_LINK + 1690843899 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf848bc0-2ff4-11ee-b00f-c1ca007fb916 + + + diff --git a/graph/incidents_graphml/c/cf8a1b80-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/c/cf8a1b80-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0280a24d306df6f4dd368a09bd5a0b2d0719de03 --- /dev/null +++ b/graph/incidents_graphml/c/cf8a1b80-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.13 + 100.64.32.13 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485373 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cf8a1b80-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/c/cf8eb330-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/c/cf8eb330-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5dae3a133a0032511d0ddea87e072d9761658fd --- /dev/null +++ b/graph/incidents_graphml/c/cf8eb330-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.55 + 100.64.50.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813440 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cf8eb330-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/c/cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/c/cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4daf862c151308823ff3825cafd6f4effe351eba --- /dev/null +++ b/graph/incidents_graphml/c/cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.142 + 100.64.17.142 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.143 + 100.64.17.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.144 + 100.64.17.144 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.145 + 100.64.17.145 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.146 + 100.64.17.146 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.147 + 100.64.17.147 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030280 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf92f8e0-02d5-11ef-8e1f-0f6fc7e8988b + + + diff --git a/graph/incidents_graphml/c/cf9302c0-2d17-11ee-92ce-ad047e277e2c.graphml b/graph/incidents_graphml/c/cf9302c0-2d17-11ee-92ce-ad047e277e2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc76e6224fb7b3619bd216f48bf3ba39275dfd40 --- /dev/null +++ b/graph/incidents_graphml/c/cf9302c0-2d17-11ee-92ce-ad047e277e2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.126 + USER-0015-1381.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690529078 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cf9302c0-2d17-11ee-92ce-ad047e277e2c + + + diff --git a/graph/incidents_graphml/c/cf96e620-1146-11ee-9a03-6507ae27d54b.graphml b/graph/incidents_graphml/c/cf96e620-1146-11ee-9a03-6507ae27d54b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db489ae4ef51448ff60edce30ac9db0ba6edfe0b --- /dev/null +++ b/graph/incidents_graphml/c/cf96e620-1146-11ee-9a03-6507ae27d54b.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.103 + 100.64.10.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.53 + 100.64.29.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.149 + USER-0015-1235.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.129 + 100.64.25.129 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf96e620-1146-11ee-9a03-6507ae27d54b + + + diff --git a/graph/incidents_graphml/c/cf9bab80-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/c/cf9bab80-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a008da625940e760c7d32f83540ea8b968839d4 --- /dev/null +++ b/graph/incidents_graphml/c/cf9bab80-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.79 + 100.64.22.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813440 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cf9bab80-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/c/cf9bf5d0-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/c/cf9bf5d0-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fd9731078c23e64e8e06a0fb370fc0c076566da --- /dev/null +++ b/graph/incidents_graphml/c/cf9bf5d0-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.13 + 100.64.32.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485373 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cf9bf5d0-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/c/cfUSER-140380-5b8b-11ee-9925-ebc6745d6541.graphml b/graph/incidents_graphml/c/cfUSER-140380-5b8b-11ee-9925-ebc6745d6541.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17f7a82f3d59d8fe9ec7cd348641309c85d89d83 --- /dev/null +++ b/graph/incidents_graphml/c/cfUSER-140380-5b8b-11ee-9925-ebc6745d6541.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.44 + 100.64.18.44 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695636652 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfUSER-140380-5b8b-11ee-9925-ebc6745d6541 + + + diff --git a/graph/incidents_graphml/c/cfa3ae80-2dc6-11ef-976a-4f91a87d18f6.graphml b/graph/incidents_graphml/c/cfa3ae80-2dc6-11ef-976a-4f91a87d18f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a6b3b4b26ff5ce03c9bd828e8dabfc1b52d383e --- /dev/null +++ b/graph/incidents_graphml/c/cfa3ae80-2dc6-11ef-976a-4f91a87d18f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.74 + USER-0015-1978.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718751738 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfa3ae80-2dc6-11ef-976a-4f91a87d18f6 + + + diff --git a/graph/incidents_graphml/c/cfac4980-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/c/cfac4980-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..326d6bf42eb45510c49596ad989a6888e0ad5901 --- /dev/null +++ b/graph/incidents_graphml/c/cfac4980-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.21 + 100.64.21.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfac4980-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/c/cfacb810-1146-11ee-9a03-6507ae27d54b.graphml b/graph/incidents_graphml/c/cfacb810-1146-11ee-9a03-6507ae27d54b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..891f2487f8ca2e142e9e563b6a0027b57250aa95 --- /dev/null +++ b/graph/incidents_graphml/c/cfacb810-1146-11ee-9a03-6507ae27d54b.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.252 + 100.64.27.252 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.86 + 100.64.50.86 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfacb810-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfacb810-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfacb810-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfacb810-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfacb810-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfacb810-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfacb810-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfacb810-1146-11ee-9a03-6507ae27d54b + + + diff --git a/graph/incidents_graphml/c/cfb03aa0-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/c/cfb03aa0-3245-11ef-9bb6-5bd0425d571b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96d7d884849b9e929c704989124b3049de27c829 --- /dev/null +++ b/graph/incidents_graphml/c/cfb03aa0-3245-11ef-9bb6-5bd0425d571b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.59.91 + 172.30.59.91 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.86.207 + 100.64.86.207 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719246089 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cfb03aa0-3245-11ef-9bb6-5bd0425d571b + + + diff --git a/graph/incidents_graphml/c/cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63.graphml b/graph/incidents_graphml/c/cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f404076fb963d233684eeef74c4032b94468aa9f --- /dev/null +++ b/graph/incidents_graphml/c/cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.134 + 100.64.70.134 + ["Exploiting Target","Exploiting Host"] + 0.905078125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.48.7 + 100.64.48.7 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.135 + 100.64.70.135 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.4.233 + 100.64.4.233 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.136 + 100.64.70.136 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744554 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfb4c4a0-3825-11ee-b5a7-eb9164a8ca63 + + + diff --git a/graph/incidents_graphml/c/cfb570f0-31cf-11ee-98fc-ffc5d40cae26.graphml b/graph/incidents_graphml/c/cfb570f0-31cf-11ee-98fc-ffc5d40cae26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8a131f784f0b7bce5aa556dabb29fc77f6ddbe5 --- /dev/null +++ b/graph/incidents_graphml/c/cfb570f0-31cf-11ee-98fc-ffc5d40cae26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.218 + 100.64.56.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691047910 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cfb570f0-31cf-11ee-98fc-ffc5d40cae26 + + + diff --git a/graph/incidents_graphml/c/cfc6b8b0-ff26-11ec-890e-b9233ab766d3.graphml b/graph/incidents_graphml/c/cfc6b8b0-ff26-11ec-890e-b9233ab766d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9b2bdfb87e8eb6f7fc27c4ab7ea6f688da436b3 --- /dev/null +++ b/graph/incidents_graphml/c/cfc6b8b0-ff26-11ec-890e-b9233ab766d3.graphml @@ -0,0 +1,171 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.93 + 100.64.76.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.217 + 100.64.72.217 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.235 + 100.64.72.235 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.4.64 + 100.64.4.64 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657330270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cfc6b8b0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cfc6b8b0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cfc6b8b0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cfc6b8b0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cfc6b8b0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cfc6b8b0-ff26-11ec-890e-b9233ab766d3 + + + INCIDENT_LINK + 1657330270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cfc6b8b0-ff26-11ec-890e-b9233ab766d3 + + + diff --git a/graph/incidents_graphml/c/cfcb9320-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/c/cfcb9320-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d02c7d195c6f6c5d07375c34fedb79ce2d6ca05d --- /dev/null +++ b/graph/incidents_graphml/c/cfcb9320-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.185 + 100.64.15.185 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344935 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfcb9320-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/c/cfd55500-31cf-11ee-98fc-ffc5d40cae26.graphml b/graph/incidents_graphml/c/cfd55500-31cf-11ee-98fc-ffc5d40cae26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be942d495b7ad30dd882c17982bb770150565c25 --- /dev/null +++ b/graph/incidents_graphml/c/cfd55500-31cf-11ee-98fc-ffc5d40cae26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.218 + 100.64.56.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691047911 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + cfd55500-31cf-11ee-98fc-ffc5d40cae26 + + + diff --git a/graph/incidents_graphml/c/cfe7e370-2dc6-11ef-976a-4f91a87d18f6.graphml b/graph/incidents_graphml/c/cfe7e370-2dc6-11ef-976a-4f91a87d18f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b815c6b110eb935440567faa6c4352016fe7fce --- /dev/null +++ b/graph/incidents_graphml/c/cfe7e370-2dc6-11ef-976a-4f91a87d18f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.77 + 100.64.86.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718751738 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfe7e370-2dc6-11ef-976a-4f91a87d18f6 + + + diff --git a/graph/incidents_graphml/c/cfed91a0-1146-11ee-9a03-6507ae27d54b.graphml b/graph/incidents_graphml/c/cfed91a0-1146-11ee-9a03-6507ae27d54b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1360df75794145d1969f0f1e977c43ad0b44633c --- /dev/null +++ b/graph/incidents_graphml/c/cfed91a0-1146-11ee-9a03-6507ae27d54b.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.88 + 100.64.50.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.89 + 100.64.50.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.157 + 100.64.14.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.90 + 100.64.50.90 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfed91a0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfed91a0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfed91a0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfed91a0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfed91a0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfed91a0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfed91a0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + cfed91a0-1146-11ee-9a03-6507ae27d54b + + + diff --git a/graph/incidents_graphml/c/cff279f0-31cf-11ee-98fc-ffc5d40cae26.graphml b/graph/incidents_graphml/c/cff279f0-31cf-11ee-98fc-ffc5d40cae26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e9cfdaba6136209b7f4eea1cc7b38c7da149787 --- /dev/null +++ b/graph/incidents_graphml/c/cff279f0-31cf-11ee-98fc-ffc5d40cae26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.107 + 100.64.52.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691047911 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + cff279f0-31cf-11ee-98fc-ffc5d40cae26 + + + diff --git a/graph/incidents_graphml/c/cff29940-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/c/cff29940-0ad1-11ef-8694-dbcc61061be0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4acf31f1e4490a530fe7a223ad20bdce0608e2b --- /dev/null +++ b/graph/incidents_graphml/c/cff29940-0ad1-11ef-8694-dbcc61061be0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.144 + 100.64.15.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714908172 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cff29940-0ad1-11ef-8694-dbcc61061be0 + + + diff --git a/graph/incidents_graphml/c/cff4d030-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/c/cff4d030-f286-11ec-babd-d5ed2eda1ac6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8bdeb8bf0b58ef2b02c4eb5f9b6ea7dcd91b38fe --- /dev/null +++ b/graph/incidents_graphml/c/cff4d030-f286-11ec-babd-d5ed2eda1ac6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.105 + 100.64.81.105 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.157 + USER-0015-1703.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655942137 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cff4d030-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655942137 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + cff4d030-f286-11ec-babd-d5ed2eda1ac6 + + + diff --git a/graph/incidents_graphml/d/d001ed40-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/d/d001ed40-056f-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..421aa13ae377daddce8b6fe738bff158f783e1a7 --- /dev/null +++ b/graph/incidents_graphml/d/d001ed40-056f-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.55 + 100.64.75.55 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.199 + 100.64.72.199 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1686168828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d001ed40-056f-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686168828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d001ed40-056f-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/d/d0022390-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/d/d0022390-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6592e81e3d29369ac1ab0bfdf98889da0b9e475 --- /dev/null +++ b/graph/incidents_graphml/d/d0022390-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.72 + 100.64.57.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685492800 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0022390-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/d/d00333d0-2698-11ef-9cc1-636a286f4a71.graphml b/graph/incidents_graphml/d/d00333d0-2698-11ef-9cc1-636a286f4a71.graphml new file mode 100644 index 0000000000000000000000000000000000000000..433789e26f58035d6bdd40a7118934de010bf912 --- /dev/null +++ b/graph/incidents_graphml/d/d00333d0-2698-11ef-9cc1-636a286f4a71.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.116 + 100.64.56.116 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717962323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d00333d0-2698-11ef-9cc1-636a286f4a71 + + + diff --git a/graph/incidents_graphml/d/d005ac10-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/d/d005ac10-0ad1-11ef-8694-dbcc61061be0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1d9282c7bb6ae108d667c4832e3608554046910 --- /dev/null +++ b/graph/incidents_graphml/d/d005ac10-0ad1-11ef-8694-dbcc61061be0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.144 + 100.64.15.144 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1714908172 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d005ac10-0ad1-11ef-8694-dbcc61061be0 + + + diff --git a/graph/incidents_graphml/d/d0109440-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/d/d0109440-3b73-11ef-b1e4-3da31b742190.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54655bf9d947335bed4fc52dd03328ef08d2388a --- /dev/null +++ b/graph/incidents_graphml/d/d0109440-3b73-11ef-b1e4-3da31b742190.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.25 + 100.64.12.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.152 + 100.64.25.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.56 + 100.64.46.56 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.189 + 100.64.19.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0109440-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0109440-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0109440-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0109440-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0109440-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0109440-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0109440-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0109440-3b73-11ef-b1e4-3da31b742190 + + + diff --git a/graph/incidents_graphml/d/d0111680-2698-11ef-9cc1-636a286f4a71.graphml b/graph/incidents_graphml/d/d0111680-2698-11ef-9cc1-636a286f4a71.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c196afaebbe555bf007314ceb404bf53b4db5811 --- /dev/null +++ b/graph/incidents_graphml/d/d0111680-2698-11ef-9cc1-636a286f4a71.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.116 + 100.64.56.116 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717962324 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0111680-2698-11ef-9cc1-636a286f4a71 + + + diff --git a/graph/incidents_graphml/d/d014b1f0-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/d/d014b1f0-056f-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cdc06a7b27bdb73ef07ba461fbf18203ef9431c --- /dev/null +++ b/graph/incidents_graphml/d/d014b1f0-056f-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.15 + 100.64.59.15 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.73.59 + 100.64.73.59 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1686168828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d014b1f0-056f-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686168828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d014b1f0-056f-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/d/d0160130-1146-11ee-9a03-6507ae27d54b.graphml b/graph/incidents_graphml/d/d0160130-1146-11ee-9a03-6507ae27d54b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e84db1b361953f4420de6d3f4e4f2b38b76b830 --- /dev/null +++ b/graph/incidents_graphml/d/d0160130-1146-11ee-9a03-6507ae27d54b.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.46 + 100.64.36.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.249 + 100.64.24.249 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.214 + 100.64.24.214 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.131 + 100.64.34.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0160130-1146-11ee-9a03-6507ae27d54b + + + diff --git a/graph/incidents_graphml/d/d01efa60-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/d/d01efa60-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6642f8c2e3603c3e256603ca3103845875bb7528 --- /dev/null +++ b/graph/incidents_graphml/d/d01efa60-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.57.72 + 100.64.57.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685492800 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d01efa60-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/d/d020e9f0-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/d/d020e9f0-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..388fc4742d4d264cd854508246f8a86f014d7e8b --- /dev/null +++ b/graph/incidents_graphml/d/d020e9f0-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.225 + 100.64.72.225 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.109 + USER-0015-1643.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687765268 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d020e9f0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765268 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d020e9f0-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/d/d0218430-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/d/d0218430-3b73-11ef-b1e4-3da31b742190.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e892c9bbc1e0d0f5fa6a2e82cbad75d6283034d7 --- /dev/null +++ b/graph/incidents_graphml/d/d0218430-3b73-11ef-b1e4-3da31b742190.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.58 + 100.64.46.58 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.219 + 100.64.37.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.59 + 100.64.46.59 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.155 + 100.64.32.155 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0218430-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0218430-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0218430-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0218430-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0218430-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0218430-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0218430-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0218430-3b73-11ef-b1e4-3da31b742190 + + + diff --git a/graph/incidents_graphml/d/d0228470-3245-11ef-9bb6-5bd0425d571b.graphml b/graph/incidents_graphml/d/d0228470-3245-11ef-9bb6-5bd0425d571b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e8c77c09b06c31cd1a3f2268ed1f541c31d0a8e --- /dev/null +++ b/graph/incidents_graphml/d/d0228470-3245-11ef-9bb6-5bd0425d571b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.59.91 + 172.30.59.91 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.86.209 + USER-0015-1995.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719246089 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0228470-3245-11ef-9bb6-5bd0425d571b + + + diff --git a/graph/incidents_graphml/d/d0291560-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/d/d0291560-9773-11ed-8e25-218966643970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d906873e052400face01009d262b373c78b147c1 --- /dev/null +++ b/graph/incidents_graphml/d/d0291560-9773-11ed-8e25-218966643970.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.252 + 100.64.81.252 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.59 + 100.64.73.59 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1674075918 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0291560-9773-11ed-8e25-218966643970 + + + INCIDENT_LINK + 1674075918 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0291560-9773-11ed-8e25-218966643970 + + + diff --git a/graph/incidents_graphml/d/d0294140-3f8c-11ee-9b72-817daf89a87d.graphml b/graph/incidents_graphml/d/d0294140-3f8c-11ee-9b72-817daf89a87d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac9f3a3858a4865cb2732758a80da07c2addca05 --- /dev/null +++ b/graph/incidents_graphml/d/d0294140-3f8c-11ee-9b72-817daf89a87d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.255 + 100.64.20.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692558451 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0294140-3f8c-11ee-9b72-817daf89a87d + + + diff --git a/graph/incidents_graphml/d/d02b1130-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/d/d02b1130-9773-11ed-8e25-218966643970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0b931a15f82b718966a85e17562469db7fb796a --- /dev/null +++ b/graph/incidents_graphml/d/d02b1130-9773-11ed-8e25-218966643970.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.253 + 100.64.81.253 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.37 + HOST-12731 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1674075918 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d02b1130-9773-11ed-8e25-218966643970 + + + INCIDENT_LINK + 1674075918 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d02b1130-9773-11ed-8e25-218966643970 + + + diff --git a/graph/incidents_graphml/d/d02bca40-2dc6-11ef-976a-4f91a87d18f6.graphml b/graph/incidents_graphml/d/d02bca40-2dc6-11ef-976a-4f91a87d18f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68c817093703ae0d0635edfa51cc90d784658017 --- /dev/null +++ b/graph/incidents_graphml/d/d02bca40-2dc6-11ef-976a-4f91a87d18f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.26.29 + 100.64.26.29 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718751739 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d02bca40-2dc6-11ef-976a-4f91a87d18f6 + + + diff --git a/graph/incidents_graphml/d/d02d72d0-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/d/d02d72d0-f75e-11ee-a8c3-edac19687c67.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff6eff03caa1adf265d08f1d3f055ccdeefa7f14 --- /dev/null +++ b/graph/incidents_graphml/d/d02d72d0-f75e-11ee-a8c3-edac19687c67.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.129 + 100.64.65.129 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","CASB","Protect"] + + + INCIDENT_LINK + 1712769708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d02d72d0-f75e-11ee-a8c3-edac19687c67 + + + diff --git a/graph/incidents_graphml/d/d02e08a0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/d/d02e08a0-f286-11ec-babd-d5ed2eda1ac6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2eb906ad5b0e83bcca2284087629238f687e84d2 --- /dev/null +++ b/graph/incidents_graphml/d/d02e08a0-f286-11ec-babd-d5ed2eda1ac6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.5.246 + USER-0015-1895.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.0.113 + 100.64.0.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655942137 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d02e08a0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655942137 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d02e08a0-f286-11ec-babd-d5ed2eda1ac6 + + + diff --git a/graph/incidents_graphml/d/d030ad90-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/d/d030ad90-4e2d-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bdd942310882affdfb9e762bf8196a20078599a --- /dev/null +++ b/graph/incidents_graphml/d/d030ad90-4e2d-11ee-81da-13947cfea124.graphml @@ -0,0 +1,617 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.210 + 100.64.30.210 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.211 + 100.64.30.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.212 + 100.64.30.212 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.213 + USER-0015-1286.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.214 + 100.64.30.214 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.155 + 100.64.21.155 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.215 + 100.64.30.215 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.216 + 100.64.30.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.217 + 100.64.30.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.170 + 100.64.24.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.218 + 100.64.30.218 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.219 + 100.64.30.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.57 + 100.64.28.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.220 + 100.64.30.220 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.221 + 100.64.30.221 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.169 + 100.64.16.169 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166916 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d030ad90-4e2d-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/d/d0319180-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/d/d0319180-f75e-11ee-a8c3-edac19687c67.graphml new file mode 100644 index 0000000000000000000000000000000000000000..059364b641ee86a55d7da3dbf42b29b3b4b79d90 --- /dev/null +++ b/graph/incidents_graphml/d/d0319180-f75e-11ee-a8c3-edac19687c67.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.65.129 + 100.64.65.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712769708 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0319180-f75e-11ee-a8c3-edac19687c67 + + + diff --git a/graph/incidents_graphml/d/d0342bb0-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/d/d0342bb0-0e2a-11ef-801a-2fb46581ffa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..918cb3b6329e471ddd87e8136148c06b9ff2606a --- /dev/null +++ b/graph/incidents_graphml/d/d0342bb0-0e2a-11ef-801a-2fb46581ffa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.70 + 100.64.6.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715276251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0342bb0-0e2a-11ef-801a-2fb46581ffa8 + + + diff --git a/graph/incidents_graphml/d/d0351940-2698-11ef-9cc1-636a286f4a71.graphml b/graph/incidents_graphml/d/d0351940-2698-11ef-9cc1-636a286f4a71.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ec0b494cb497b961aecc089e52c9518737cf816 --- /dev/null +++ b/graph/incidents_graphml/d/d0351940-2698-11ef-9cc1-636a286f4a71.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.103 + 100.64.15.103 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717962324 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0351940-2698-11ef-9cc1-636a286f4a71 + + + diff --git a/graph/incidents_graphml/d/d0389ce0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/d/d0389ce0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b21c71773bef7f408976f3b845f935b04191c02e --- /dev/null +++ b/graph/incidents_graphml/d/d0389ce0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.74 + 100.64.57.74 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685492801 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0389ce0-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/d/d03a3130-3f8c-11ee-9b72-817daf89a87d.graphml b/graph/incidents_graphml/d/d03a3130-3f8c-11ee-9b72-817daf89a87d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81beb690bfb487c1bedabb1e31f08550b0ed26c2 --- /dev/null +++ b/graph/incidents_graphml/d/d03a3130-3f8c-11ee-9b72-817daf89a87d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.255 + 100.64.20.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692558451 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d03a3130-3f8c-11ee-9b72-817daf89a87d + + + diff --git a/graph/incidents_graphml/d/d03fb1b0-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/d/d03fb1b0-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..937da9aca0d811a4fbd09ec95fe1747fda3cc4e7 --- /dev/null +++ b/graph/incidents_graphml/d/d03fb1b0-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.249 + 100.64.12.249 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d03fb1b0-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/d/d0417050-10d6-11ef-8c06-93e20871a0e5.graphml b/graph/incidents_graphml/d/d0417050-10d6-11ef-8c06-93e20871a0e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7113c9d76b798655c352660cb08b551f33d7815c --- /dev/null +++ b/graph/incidents_graphml/d/d0417050-10d6-11ef-8c06-93e20871a0e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.13 + 100.64.25.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715570027 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0417050-10d6-11ef-8c06-93e20871a0e5 + + + diff --git a/graph/incidents_graphml/d/d043bc10-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/d/d043bc10-0e2a-11ef-801a-2fb46581ffa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffb9b18fdcfed17798e7ea989bb8d58527d28cfc --- /dev/null +++ b/graph/incidents_graphml/d/d043bc10-0e2a-11ef-801a-2fb46581ffa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.70 + 100.64.6.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715276251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d043bc10-0e2a-11ef-801a-2fb46581ffa8 + + + diff --git a/graph/incidents_graphml/d/d0444340-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/d0444340-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39b21cb48c62846b0a9393d7dbe3825842b8dfc7 --- /dev/null +++ b/graph/incidents_graphml/d/d0444340-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.102 + 100.64.85.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673583715 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0444340-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/d/d0448290-2698-11ef-9cc1-636a286f4a71.graphml b/graph/incidents_graphml/d/d0448290-2698-11ef-9cc1-636a286f4a71.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e46933a6ab09c5b27134cc4f6db988f6339422b --- /dev/null +++ b/graph/incidents_graphml/d/d0448290-2698-11ef-9cc1-636a286f4a71.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.103 + 100.64.15.103 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717962324 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0448290-2698-11ef-9cc1-636a286f4a71 + + + diff --git a/graph/incidents_graphml/d/d0451850-5fe6-11ee-80e7-7732713cc006.graphml b/graph/incidents_graphml/d/d0451850-5fe6-11ee-80e7-7732713cc006.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bddfb634c987de1e49abdd2dbfe009fb1cab317 --- /dev/null +++ b/graph/incidents_graphml/d/d0451850-5fe6-11ee-80e7-7732713cc006.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.44 + 100.64.16.44 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696115543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0451850-5fe6-11ee-80e7-7732713cc006 + + + diff --git a/graph/incidents_graphml/d/d049c180-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/d049c180-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0975fb64c0eff75051dc1afb8fb34c3b9897b32 --- /dev/null +++ b/graph/incidents_graphml/d/d049c180-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.102 + 100.64.85.102 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673583715 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d049c180-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/d/d04e14f0-305b-11ef-89a2-c78d159172f4.graphml b/graph/incidents_graphml/d/d04e14f0-305b-11ef-89a2-c78d159172f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc1d2984b702ceb9ccb35d8fc96f77f3124ba040 --- /dev/null +++ b/graph/incidents_graphml/d/d04e14f0-305b-11ef-89a2-c78d159172f4.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.64 + 100.64.15.64 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.65 + 100.64.15.65 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.66 + 100.64.15.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.250 + 100.64.14.250 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719035636 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d04e14f0-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035636 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d04e14f0-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035636 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d04e14f0-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035636 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d04e14f0-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035636 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d04e14f0-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035636 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d04e14f0-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035636 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d04e14f0-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035636 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d04e14f0-305b-11ef-89a2-c78d159172f4 + + + diff --git a/graph/incidents_graphml/d/d0506aa0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/d/d0506aa0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2bdb5fe3112657c980d29c141a93cf0a7e0430d7 --- /dev/null +++ b/graph/incidents_graphml/d/d0506aa0-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.57.74 + 100.64.57.74 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685492801 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0506aa0-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/d/d050c8b0-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/d/d050c8b0-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25f4334170a9f81fee9a318ecb769c1946e964f5 --- /dev/null +++ b/graph/incidents_graphml/d/d050c8b0-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.249 + 100.64.12.249 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d050c8b0-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/d/d05127c0-10d6-11ef-8c06-93e20871a0e5.graphml b/graph/incidents_graphml/d/d05127c0-10d6-11ef-8c06-93e20871a0e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24a2cb8bbeb8bae239f6487320ff3551c6d8960e --- /dev/null +++ b/graph/incidents_graphml/d/d05127c0-10d6-11ef-8c06-93e20871a0e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.13 + 100.64.25.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715570027 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d05127c0-10d6-11ef-8c06-93e20871a0e5 + + + diff --git a/graph/incidents_graphml/d/d054f3d0-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/d/d054f3d0-0823-11ee-af5c-6f7331aea810.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce87913fc65a1642ff2da835af54edac813db3d2 --- /dev/null +++ b/graph/incidents_graphml/d/d054f3d0-0823-11ee-af5c-6f7331aea810.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.251 + 100.64.55.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686466040 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d054f3d0-0823-11ee-af5c-6f7331aea810 + + + diff --git a/graph/incidents_graphml/d/d057ba40-39b8-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/d/d057ba40-39b8-11ee-84c9-adc60bfa2a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..284ee9c1a99a2b5450272b8b7d9a64aac7527ac7 --- /dev/null +++ b/graph/incidents_graphml/d/d057ba40-39b8-11ee-84c9-adc60bfa2a04.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.227.139 + 172.30.227.139 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.34 + 100.64.97.34 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691917642 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d057ba40-39b8-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917642 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d057ba40-39b8-11ee-84c9-adc60bfa2a04 + + + diff --git a/graph/incidents_graphml/d/d05a31c0-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/d/d05a31c0-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..74b035beea119cc96f80c0a479b63967c21e86af --- /dev/null +++ b/graph/incidents_graphml/d/d05a31c0-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1695779247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d05a31c0-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/d/d0603200-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/d/d0603200-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b035fb6bf9a19eeba8c020f9c0437d387da47ec9 --- /dev/null +++ b/graph/incidents_graphml/d/d0603200-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.15 + 100.64.22.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0603200-f381-11ee-b9e4-ef5a54940d7a + + + INCIDENT_LINK + 1712344936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0603200-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/d/d064a6d0-dfa1-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/d/d064a6d0-dfa1-11ee-9120-ff7b7094ac3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab1f14d0bc10b84e397fcf2698edf02a3abf4662 --- /dev/null +++ b/graph/incidents_graphml/d/d064a6d0-dfa1-11ee-9120-ff7b7094ac3d.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.185 + 100.64.70.185 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","Okta","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.186 + 100.64.70.186 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.187 + 100.64.70.187 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.188 + 100.64.70.188 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.42.97 + 100.64.42.97 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.189 + 100.64.70.189 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.17.125 + 100.64.17.125 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.21.1 + 100.64.21.1 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.190 + 100.64.70.190 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.17.127 + USER-0015-1512.example.internal + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159657 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d064a6d0-dfa1-11ee-9120-ff7b7094ac3d + + + diff --git a/graph/incidents_graphml/d/d065f5f0-1146-11ee-9a03-6507ae27d54b.graphml b/graph/incidents_graphml/d/d065f5f0-1146-11ee-9a03-6507ae27d54b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c16100f5932ffaf80c803512d5c1f91de9e2a467 --- /dev/null +++ b/graph/incidents_graphml/d/d065f5f0-1146-11ee-9a03-6507ae27d54b.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.94 + 100.64.50.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.34 + 100.64.18.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.235 + 100.64.11.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.73 + 100.64.27.73 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.5 + 100.64.29.5 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.105 + 100.64.36.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.95 + 100.64.50.95 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.44 + 100.64.19.44 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.103 + 100.64.10.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.53 + 100.64.29.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.149 + USER-0015-1235.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.129 + 100.64.25.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.140 + 100.64.27.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.195 + 100.64.28.195 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d065f5f0-1146-11ee-9a03-6507ae27d54b + + + diff --git a/graph/incidents_graphml/d/d06c4c60-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/d/d06c4c60-0823-11ee-af5c-6f7331aea810.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd4f888f2d48532e3344161207cbb4f8a477272a --- /dev/null +++ b/graph/incidents_graphml/d/d06c4c60-0823-11ee-af5c-6f7331aea810.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.251 + 100.64.55.251 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686466041 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d06c4c60-0823-11ee-af5c-6f7331aea810 + + + diff --git a/graph/incidents_graphml/d/d0705ea0-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/d/d0705ea0-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c0ca4c1b17d604f0c056bf3ae75bbe86e4a6dce --- /dev/null +++ b/graph/incidents_graphml/d/d0705ea0-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.15 + 100.64.22.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0705ea0-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/d/d0768cf0-2031-11ed-9c49-d577d9b7e617.graphml b/graph/incidents_graphml/d/d0768cf0-2031-11ed-9c49-d577d9b7e617.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6003de62836ab1c50ad0158bb4b32060a09cb49b --- /dev/null +++ b/graph/incidents_graphml/d/d0768cf0-2031-11ed-9c49-d577d9b7e617.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.192 + 100.64.79.192 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660963384 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0768cf0-2031-11ed-9c49-d577d9b7e617 + + + diff --git a/graph/incidents_graphml/d/d078c510-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/d/d078c510-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1638ca9b1f41af6f2914ecacd494b066bf03640b --- /dev/null +++ b/graph/incidents_graphml/d/d078c510-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813441 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d078c510-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/d/d07a2c40-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/d/d07a2c40-8704-11ed-bb4c-dd95bc70531e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8f54d1992da224782dcea1da4cda95db5935443 --- /dev/null +++ b/graph/incidents_graphml/d/d07a2c40-8704-11ed-bb4c-dd95bc70531e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.120 + 100.64.83.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","AWS VPC Security"] + + + HOST + 10.106.93.7 + 10.106.93.7 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1672269026 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d07a2c40-8704-11ed-bb4c-dd95bc70531e + + + diff --git a/graph/incidents_graphml/d/d07f0e40-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/d/d07f0e40-8704-11ed-bb4c-dd95bc70531e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bb3d4c25425b21f925a98db407eb3008a172f17 --- /dev/null +++ b/graph/incidents_graphml/d/d07f0e40-8704-11ed-bb4c-dd95bc70531e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.106.93.7 + 10.106.93.7 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.120 + 100.64.83.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1672269026 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d07f0e40-8704-11ed-bb4c-dd95bc70531e + + + diff --git a/graph/incidents_graphml/d/d080d960-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/d/d080d960-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07a0aafbaf3c71fea64d86e656d127be2655f229 --- /dev/null +++ b/graph/incidents_graphml/d/d080d960-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.76 + 100.64.64.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d080d960-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/d/d08b1f60-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/d08b1f60-95ae-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..671288198494bd9e181392f0a5c345c4cceb14a0 --- /dev/null +++ b/graph/incidents_graphml/d/d08b1f60-95ae-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.250 + 100.64.72.250 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1673881357 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d08b1f60-95ae-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673881357 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d08b1f60-95ae-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/d/d08e48e0-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/d/d08e48e0-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d708f9f748d86d83aba551cdf255524e56c67761 --- /dev/null +++ b/graph/incidents_graphml/d/d08e48e0-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.57 + 100.64.50.57 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813441 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d08e48e0-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/d/d08fc510-1146-11ee-9a03-6507ae27d54b.graphml b/graph/incidents_graphml/d/d08fc510-1146-11ee-9a03-6507ae27d54b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17111990054e7c5bb77073ed1f0a35432e29f15d --- /dev/null +++ b/graph/incidents_graphml/d/d08fc510-1146-11ee-9a03-6507ae27d54b.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.98 + 100.64.50.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.76 + 100.64.50.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.3 + 100.64.25.3 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.194 + 100.64.15.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.74 + USER-0015-1252.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.99 + 100.64.50.99 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.50 + 100.64.30.50 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.100 + 100.64.50.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.28 + USER-0015-1300.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.101 + 100.64.50.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.151 + USER-0015-1387.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.102 + 100.64.50.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d08fc510-1146-11ee-9a03-6507ae27d54b + + + diff --git a/graph/incidents_graphml/d/d091c950-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/d/d091c950-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..184697c882bdc6464aef23837d081d13fc2e1ef8 --- /dev/null +++ b/graph/incidents_graphml/d/d091c950-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.76 + 100.64.64.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344937 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d091c950-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/d/d0974570-31cf-11ee-98fc-ffc5d40cae26.graphml b/graph/incidents_graphml/d/d0974570-31cf-11ee-98fc-ffc5d40cae26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4e8c79520daaaff5bde9856542e49502346ef05 --- /dev/null +++ b/graph/incidents_graphml/d/d0974570-31cf-11ee-98fc-ffc5d40cae26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.220 + 100.64.56.220 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691047912 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0974570-31cf-11ee-98fc-ffc5d40cae26 + + + diff --git a/graph/incidents_graphml/d/d09ca0c0-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/d/d09ca0c0-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c36799f2999acac5e8385722caad4f70155baa22 --- /dev/null +++ b/graph/incidents_graphml/d/d09ca0c0-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.108 + 100.64.15.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813441 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d09ca0c0-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/d/d0a24f70-305b-11ef-89a2-c78d159172f4.graphml b/graph/incidents_graphml/d/d0a24f70-305b-11ef-89a2-c78d159172f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..097b48c473b4f16e1a9a4717922a238abbdcf4b2 --- /dev/null +++ b/graph/incidents_graphml/d/d0a24f70-305b-11ef-89a2-c78d159172f4.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.170 + 100.64.14.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.38 + 100.64.10.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.73 + 100.64.15.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719035637 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0a24f70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035637 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0a24f70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035637 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0a24f70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035637 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0a24f70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035637 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0a24f70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035637 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0a24f70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035637 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0a24f70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035637 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0a24f70-305b-11ef-89a2-c78d159172f4 + + + diff --git a/graph/incidents_graphml/d/d0a4dc20-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/d/d0a4dc20-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d30dad57dda184629c658da9637a087ce316aad --- /dev/null +++ b/graph/incidents_graphml/d/d0a4dc20-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.165 + 100.64.36.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344937 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0a4dc20-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/d/d0a94080-1146-11ee-9a03-6507ae27d54b.graphml b/graph/incidents_graphml/d/d0a94080-1146-11ee-9a03-6507ae27d54b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5a74ed7ae9ef479097c000a65072d9884bf4b42 --- /dev/null +++ b/graph/incidents_graphml/d/d0a94080-1146-11ee-9a03-6507ae27d54b.graphml @@ -0,0 +1,461 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.108 + 100.64.50.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.77 + USER-0015-1276.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.109 + 100.64.50.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.30 + 100.64.8.30 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.110 + 100.64.50.110 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.3 + 100.64.25.3 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.33 + 100.64.49.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.111 + USER-0015-1388.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.35 + 100.64.29.35 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.5 + 100.64.19.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.12 + 100.64.19.12 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + INCIDENT_LINK + 1687470634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0a94080-1146-11ee-9a03-6507ae27d54b + + + diff --git a/graph/incidents_graphml/d/d0ab1fb0-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/d/d0ab1fb0-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69c619d8ba149b6692965d88cc557d678d290d20 --- /dev/null +++ b/graph/incidents_graphml/d/d0ab1fb0-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.108 + 100.64.15.108 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813441 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0ab1fb0-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/d/d0d44e70-31cf-11ee-98fc-ffc5d40cae26.graphml b/graph/incidents_graphml/d/d0d44e70-31cf-11ee-98fc-ffc5d40cae26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6955611e718775e1bf68d35b11c54fe0ef84ac86 --- /dev/null +++ b/graph/incidents_graphml/d/d0d44e70-31cf-11ee-98fc-ffc5d40cae26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.220 + 100.64.56.220 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691047912 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d0d44e70-31cf-11ee-98fc-ffc5d40cae26 + + + diff --git a/graph/incidents_graphml/d/d0d577c0-2dc6-11ef-976a-4f91a87d18f6.graphml b/graph/incidents_graphml/d/d0d577c0-2dc6-11ef-976a-4f91a87d18f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef139b63e7a609f3fc194abfb61eef0b9883a2af --- /dev/null +++ b/graph/incidents_graphml/d/d0d577c0-2dc6-11ef-976a-4f91a87d18f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.106 + 100.64.2.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1718751740 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0d577c0-2dc6-11ef-976a-4f91a87d18f6 + + + diff --git a/graph/incidents_graphml/d/d0de5190-2698-11ef-9cc1-636a286f4a71.graphml b/graph/incidents_graphml/d/d0de5190-2698-11ef-9cc1-636a286f4a71.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b6f6b761b55d53ef1a22d7bec77148b85d32f0f --- /dev/null +++ b/graph/incidents_graphml/d/d0de5190-2698-11ef-9cc1-636a286f4a71.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.118 + 100.64.56.118 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717962325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0de5190-2698-11ef-9cc1-636a286f4a71 + + + diff --git a/graph/incidents_graphml/d/d0e0a2c0-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/d/d0e0a2c0-0ad1-11ef-8694-dbcc61061be0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e943f7bcfffa08b01bc687baddeb3d7b165d4692 --- /dev/null +++ b/graph/incidents_graphml/d/d0e0a2c0-0ad1-11ef-8694-dbcc61061be0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.146 + 100.64.15.146 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714908174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d0e0a2c0-0ad1-11ef-8694-dbcc61061be0 + + + diff --git a/graph/incidents_graphml/d/d0e69680-1814-11ef-a290-d5e92fd7ebc0.graphml b/graph/incidents_graphml/d/d0e69680-1814-11ef-a290-d5e92fd7ebc0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79a8579870b74fbad4e5a30bffd2e9c3ab6c2fc1 --- /dev/null +++ b/graph/incidents_graphml/d/d0e69680-1814-11ef-a290-d5e92fd7ebc0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.4.110 + 100.64.4.110 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716366315 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0e69680-1814-11ef-a290-d5e92fd7ebc0 + + + diff --git a/graph/incidents_graphml/d/d0ef1a40-2dc6-11ef-976a-4f91a87d18f6.graphml b/graph/incidents_graphml/d/d0ef1a40-2dc6-11ef-976a-4f91a87d18f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e5bc4613f496eb35d29987e05444fa5c1e83c0d --- /dev/null +++ b/graph/incidents_graphml/d/d0ef1a40-2dc6-11ef-976a-4f91a87d18f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.2.106 + 100.64.2.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718751740 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0ef1a40-2dc6-11ef-976a-4f91a87d18f6 + + + diff --git a/graph/incidents_graphml/d/d0f20fa0-31cf-11ee-98fc-ffc5d40cae26.graphml b/graph/incidents_graphml/d/d0f20fa0-31cf-11ee-98fc-ffc5d40cae26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb7c96144a5c049267ff162f6ecdd7b7859fff09 --- /dev/null +++ b/graph/incidents_graphml/d/d0f20fa0-31cf-11ee-98fc-ffc5d40cae26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.220 + 100.64.56.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691047913 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d0f20fa0-31cf-11ee-98fc-ffc5d40cae26 + + + diff --git a/graph/incidents_graphml/d/d0f878f0-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/d/d0f878f0-e560-11ee-be14-8bb84b2c14a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9000c30e723a82d0876b4afaae48b2e33da9150 --- /dev/null +++ b/graph/incidents_graphml/d/d0f878f0-e560-11ee-be14-8bb84b2c14a8.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.93.62.164 + USER-0015-1496.example.internal + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","PAN NGFW","Vulnerability Management","Windows Active Directory"] + + + HOST + 100.64.68.96 + 100.64.68.96 + ["Exploiting Target"] + 0.578125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.97 + 100.64.68.97 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.98 + 100.64.68.98 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.99 + 100.64.68.99 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710791448 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0f878f0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791448 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0f878f0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791448 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0f878f0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791448 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0f878f0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791448 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0f878f0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791448 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0f878f0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791448 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0f878f0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791448 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d0f878f0-e560-11ee-be14-8bb84b2c14a8 + + + diff --git a/graph/incidents_graphml/d/d10cae10-5fe6-11ee-80e7-7732713cc006.graphml b/graph/incidents_graphml/d/d10cae10-5fe6-11ee-80e7-7732713cc006.graphml new file mode 100644 index 0000000000000000000000000000000000000000..605f233259c3237f4e92fe7e4c0bab4eac365df2 --- /dev/null +++ b/graph/incidents_graphml/d/d10cae10-5fe6-11ee-80e7-7732713cc006.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.220 + 100.64.15.220 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696115545 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d10cae10-5fe6-11ee-80e7-7732713cc006 + + + diff --git a/graph/incidents_graphml/d/d10d43e0-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/d/d10d43e0-a4a5-11ed-b478-67badd244434.graphml new file mode 100644 index 0000000000000000000000000000000000000000..faa9f89eb7cca5da40e87b796f442313c48f225a --- /dev/null +++ b/graph/incidents_graphml/d/d10d43e0-a4a5-11ed-b478-67badd244434.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.116 + 100.64.71.116 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1675526760 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d10d43e0-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526760 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d10d43e0-a4a5-11ed-b478-67badd244434 + + + diff --git a/graph/incidents_graphml/d/d11eba90-e69d-11ee-8f7e-8d09b3cead02.graphml b/graph/incidents_graphml/d/d11eba90-e69d-11ee-8f7e-8d09b3cead02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91d974980e09db8ca09388b422628eb225b37c6c --- /dev/null +++ b/graph/incidents_graphml/d/d11eba90-e69d-11ee-8f7e-8d09b3cead02.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.131 + 100.64.32.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.183 + 100.64.56.183 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.223 + 100.64.46.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.224 + 100.64.17.224 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.184 + 100.64.56.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927598 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d11eba90-e69d-11ee-8f7e-8d09b3cead02 + + + diff --git a/graph/incidents_graphml/d/d1212ac0-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/d/d1212ac0-210c-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfddb8e6f4675048c7da69c668d5719817ed6632 --- /dev/null +++ b/graph/incidents_graphml/d/d1212ac0-210c-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.64 + 100.64.22.64 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689204942 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1212ac0-210c-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/d/d126fb00-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/d/d126fb00-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..386051709fe5a1f063abba1465ad4e4bc7ce0a80 --- /dev/null +++ b/graph/incidents_graphml/d/d126fb00-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.18 + 100.64.7.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721029791 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d126fb00-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/d/d12b80b0-5fe6-11ee-80e7-7732713cc006.graphml b/graph/incidents_graphml/d/d12b80b0-5fe6-11ee-80e7-7732713cc006.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53fc98fd1495b18af245f3afec385b507b94146a --- /dev/null +++ b/graph/incidents_graphml/d/d12b80b0-5fe6-11ee-80e7-7732713cc006.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.46 + 100.64.16.46 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696115545 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d12b80b0-5fe6-11ee-80e7-7732713cc006 + + + diff --git a/graph/incidents_graphml/d/d135a100-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/d/d135a100-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9847a3fdf0fe38d2cff38afafb2be00ae759c4cd --- /dev/null +++ b/graph/incidents_graphml/d/d135a100-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.7.18 + 100.64.7.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721029791 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d135a100-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/d/d13603a0-4223-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/d/d13603a0-4223-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13033b35930897b34f0c436bc68342beb0820cba --- /dev/null +++ b/graph/incidents_graphml/d/d13603a0-4223-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.106 + 100.64.73.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 100.64.84.231 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1664695711 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d13603a0-4223-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/d/d1364490-31cf-11ee-98fc-ffc5d40cae26.graphml b/graph/incidents_graphml/d/d1364490-31cf-11ee-98fc-ffc5d40cae26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..523431d73acb82bfca5459f9c7ffe5cb355f1e31 --- /dev/null +++ b/graph/incidents_graphml/d/d1364490-31cf-11ee-98fc-ffc5d40cae26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.220 + 100.64.56.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691047913 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d1364490-31cf-11ee-98fc-ffc5d40cae26 + + + diff --git a/graph/incidents_graphml/d/d14096f0-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/d/d14096f0-4e2d-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bde399fdc8a01efe2971c8508f7d4b2d8c8b40f --- /dev/null +++ b/graph/incidents_graphml/d/d14096f0-4e2d-11ee-81da-13947cfea124.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.150 + 100.64.30.150 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.234 + 100.64.30.234 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.225 + 100.64.5.225 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.235 + 100.64.30.235 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.236 + 100.64.30.236 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.237 + 100.64.30.237 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.238 + 100.64.30.238 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.239 + 100.64.30.239 + [] + 0.578125 + ["Precinct"] + + + HOST + 100.64.30.240 + 100.64.30.240 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.241 + 100.64.30.241 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.242 + 100.64.30.242 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.243 + 100.64.30.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.113 + 100.64.11.113 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.244 + 100.64.30.244 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d14096f0-4e2d-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/d/d14985d0-2cea-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/d/d14985d0-2cea-11ee-b828-99998b56933c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d66e5945d86a4590984399b4f52546dfe321486e --- /dev/null +++ b/graph/incidents_graphml/d/d14985d0-2cea-11ee-b828-99998b56933c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.140 + 100.64.23.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690509754 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d14985d0-2cea-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690509754 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d14985d0-2cea-11ee-b828-99998b56933c + + + diff --git a/graph/incidents_graphml/d/d14e3b80-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/d/d14e3b80-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65f7f1085f85e553d5eed07f5069410fa009b046 --- /dev/null +++ b/graph/incidents_graphml/d/d14e3b80-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d14e3b80-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/d/d151adf0-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/d/d151adf0-4e2d-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fcd180428f92918f78c72f1f3ce4a447f0be7a7 --- /dev/null +++ b/graph/incidents_graphml/d/d151adf0-4e2d-11ee-81da-13947cfea124.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.2 + 100.64.31.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.3 + 100.64.31.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.43 + 100.64.10.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.4 + 100.64.31.4 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.5 + USER-0015-1287.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.6 + 100.64.31.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.7 + 100.64.31.7 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.108 + 100.64.24.108 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.32 + 100.64.30.32 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.113 + 100.64.20.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d151adf0-4e2d-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/d/d152f450-31cf-11ee-98fc-ffc5d40cae26.graphml b/graph/incidents_graphml/d/d152f450-31cf-11ee-98fc-ffc5d40cae26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0461cd9d118bf38150ebaecf1323d94c950384b --- /dev/null +++ b/graph/incidents_graphml/d/d152f450-31cf-11ee-98fc-ffc5d40cae26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691047913 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d152f450-31cf-11ee-98fc-ffc5d40cae26 + + + diff --git a/graph/incidents_graphml/d/d1602ce0-4e2d-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/d/d1602ce0-4e2d-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cc1c962900701c787cc4580f52e290c90761752 --- /dev/null +++ b/graph/incidents_graphml/d/d1602ce0-4e2d-11ee-81da-13947cfea124.graphml @@ -0,0 +1,777 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.14 + 100.64.31.14 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.15 + 100.64.31.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.16 + 100.64.31.16 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.17 + 100.64.31.17 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.18 + 100.64.31.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.19 + 100.64.31.19 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.38 + 100.64.6.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.171 + 100.64.12.171 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.20 + 100.64.31.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.21 + 100.64.31.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.22 + 100.64.31.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.23 + 100.64.31.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.246 + 100.64.28.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.24 + 100.64.31.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.25 + 100.64.31.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.26 + 100.64.31.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.27 + 100.64.31.27 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.74 + 100.64.20.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.28 + 100.64.31.28 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.29 + 100.64.31.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + INCIDENT_LINK + 1694166918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1602ce0-4e2d-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/d/d1680510-f381-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/d/d1680510-f381-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..baffd76d2b3a1ea160ce33b3bb88fe30ec6984f3 --- /dev/null +++ b/graph/incidents_graphml/d/d1680510-f381-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.78 + 100.64.64.78 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712344938 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d1680510-f381-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/d/d173d630-5794-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/d/d173d630-5794-11ee-97ff-3b19ab007f30.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8700df5868f3ae030009dbd90c3cb060d9f7141d --- /dev/null +++ b/graph/incidents_graphml/d/d173d630-5794-11ee-97ff-3b19ab007f30.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.98 + 100.64.69.98 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1695200717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d173d630-5794-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d173d630-5794-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d173d630-5794-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d173d630-5794-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d173d630-5794-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d173d630-5794-11ee-97ff-3b19ab007f30 + + + diff --git a/graph/incidents_graphml/d/d17e3a90-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d17e3a90-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e59362b7dfa1633ff45ac4dd1e67d1608acf9e4c --- /dev/null +++ b/graph/incidents_graphml/d/d17e3a90-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.104 + 100.64.87.104 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1999.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1665753992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d17e3a90-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d17ec010-4a09-11ee-8bf8-c1f4992fd587.graphml b/graph/incidents_graphml/d/d17ec010-4a09-11ee-8bf8-c1f4992fd587.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eef2e5d9618d1b7f3f5278c6f25e7bf23dd83eaa --- /dev/null +++ b/graph/incidents_graphml/d/d17ec010-4a09-11ee-8bf8-c1f4992fd587.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.81 + 100.64.33.81 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693711652 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d17ec010-4a09-11ee-8bf8-c1f4992fd587 + + + diff --git a/graph/incidents_graphml/d/d1823230-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d1823230-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7cc98e4638d917ce7985f642763fe15631a1341 --- /dev/null +++ b/graph/incidents_graphml/d/d1823230-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1999.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.104 + 100.64.87.104 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1665753992 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d1823230-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d184f150-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d184f150-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e00829c2cc78c6cb6a2d45d0124e12de17dcbfa9 --- /dev/null +++ b/graph/incidents_graphml/d/d184f150-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.45 + 100.64.13.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1665753992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d184f150-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d1852640-0373-11ed-8991-41244357ae3d.graphml b/graph/incidents_graphml/d/d1852640-0373-11ed-8991-41244357ae3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7acf5ca688f639ef3e5c3c7ff182194f81da58e3 --- /dev/null +++ b/graph/incidents_graphml/d/d1852640-0373-11ed-8991-41244357ae3d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.46 + 100.64.77.46 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.76 + 100.64.74.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657803148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1852640-0373-11ed-8991-41244357ae3d + + + INCIDENT_LINK + 1657803148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1852640-0373-11ed-8991-41244357ae3d + + + diff --git a/graph/incidents_graphml/d/d188c1e0-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d188c1e0-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe6118e9b64124b8322fce9338f53ef0a2b0704a --- /dev/null +++ b/graph/incidents_graphml/d/d188c1e0-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.13.45 + 100.64.13.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1665753992 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d188c1e0-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d18c9a30-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/d/d18c9a30-0ad1-11ef-8694-dbcc61061be0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be4604505688ca18531622726d14fe985806ac81 --- /dev/null +++ b/graph/incidents_graphml/d/d18c9a30-0ad1-11ef-8694-dbcc61061be0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.148 + 100.64.15.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714908175 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d18c9a30-0ad1-11ef-8694-dbcc61061be0 + + + diff --git a/graph/incidents_graphml/d/d191d630-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/d/d191d630-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..524af40dc34e898106609a72cbbf13f22287fd6f --- /dev/null +++ b/graph/incidents_graphml/d/d191d630-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.59 + 100.64.50.59 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813443 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d191d630-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/d/d1958910-305b-11ef-89a2-c78d159172f4.graphml b/graph/incidents_graphml/d/d1958910-305b-11ef-89a2-c78d159172f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad5a8c29435ca6ba894e871e99434b9d20b95d20 --- /dev/null +++ b/graph/incidents_graphml/d/d1958910-305b-11ef-89a2-c78d159172f4.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.76 + 100.64.15.76 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.77 + 100.64.15.77 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.78 + 100.64.15.78 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.79 + 100.64.15.79 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.80 + 100.64.15.80 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035638 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1958910-305b-11ef-89a2-c78d159172f4 + + + diff --git a/graph/incidents_graphml/d/d19cad00-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d19cad00-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b838d6dc913a214dd1d958cbe697b95369ebd021 --- /dev/null +++ b/graph/incidents_graphml/d/d19cad00-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.82 + 100.64.50.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330162 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d19cad00-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d1a34b60-8dde-11ee-8b81-5b5a5262c942.graphml b/graph/incidents_graphml/d/d1a34b60-8dde-11ee-8b81-5b5a5262c942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24ca79c079c70a46d2437dbf6154dd306f10e12b --- /dev/null +++ b/graph/incidents_graphml/d/d1a34b60-8dde-11ee-8b81-5b5a5262c942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.172 + 100.64.17.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701169863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d1a34b60-8dde-11ee-8b81-5b5a5262c942 + + + diff --git a/graph/incidents_graphml/d/d1a53720-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/d/d1a53720-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fb8a90ced81be9214d414adb1da413f3433f67e --- /dev/null +++ b/graph/incidents_graphml/d/d1a53720-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.189 + 100.64.30.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813443 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d1a53720-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/d/d1aa3c50-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/d/d1aa3c50-2ebf-11ee-9131-1117bdeaaaa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1e79daceb2cdba0e4bbf0c3007b0ba2912e67a1 --- /dev/null +++ b/graph/incidents_graphml/d/d1aa3c50-2ebf-11ee-9131-1117bdeaaaa3.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.125 + 100.64.72.125 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.254 + 100.64.71.254 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.17.15 + 100.64.17.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.24.116 + 100.64.24.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690711188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1aa3c50-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1aa3c50-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1aa3c50-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1aa3c50-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1aa3c50-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1aa3c50-2ebf-11ee-9131-1117bdeaaaa3 + + + diff --git a/graph/incidents_graphml/d/d1ac1650-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d1ac1650-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f0c2131fd2bed942a87ef4cae10b7fdbf1fde1a --- /dev/null +++ b/graph/incidents_graphml/d/d1ac1650-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.82 + 100.64.50.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330162 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d1ac1650-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d1ae9ef0-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/d/d1ae9ef0-2f61-11ef-b208-d10830cadc66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa4e9d7df3ad5f235ef84acd46b192dfe2d03193 --- /dev/null +++ b/graph/incidents_graphml/d/d1ae9ef0-2f61-11ef-b208-d10830cadc66.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host"] + 0.578125 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager"] + + + HOST + 100.64.88.233 + 100.64.88.233 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.234 + 100.64.88.234 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.235 + 100.64.88.235 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718928264 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1ae9ef0-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928264 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1ae9ef0-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928264 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1ae9ef0-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928264 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1ae9ef0-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928264 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1ae9ef0-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928264 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1ae9ef0-2f61-11ef-b208-d10830cadc66 + + + diff --git a/graph/incidents_graphml/d/d1b1e150-4af6-11ee-adcb-67c31ebac50c.graphml b/graph/incidents_graphml/d/d1b1e150-4af6-11ee-adcb-67c31ebac50c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de6df749e39a1beb4124b9a1a4c4fd15482f1e8d --- /dev/null +++ b/graph/incidents_graphml/d/d1b1e150-4af6-11ee-adcb-67c31ebac50c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.61 + 100.64.50.61 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693813443 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1b1e150-4af6-11ee-adcb-67c31ebac50c + + + diff --git a/graph/incidents_graphml/d/d1b302d0-8dde-11ee-8b81-5b5a5262c942.graphml b/graph/incidents_graphml/d/d1b302d0-8dde-11ee-8b81-5b5a5262c942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59cf7c8c503cdf76bce0a7e5d97320f9b07ec283 --- /dev/null +++ b/graph/incidents_graphml/d/d1b302d0-8dde-11ee-8b81-5b5a5262c942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.135 + 100.64.29.135 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701169863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1b302d0-8dde-11ee-8b81-5b5a5262c942 + + + diff --git a/graph/incidents_graphml/d/d1b9aae0-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d1b9aae0-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b74ebc26fd1b926ec06fb3cb102eb79133c78ce --- /dev/null +++ b/graph/incidents_graphml/d/d1b9aae0-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.187 + 100.64.30.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330162 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1b9aae0-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d1c30860-8dde-11ee-8b81-5b5a5262c942.graphml b/graph/incidents_graphml/d/d1c30860-8dde-11ee-8b81-5b5a5262c942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e2849d92e7694c0ded25e2cb75dd21d4302b7b5 --- /dev/null +++ b/graph/incidents_graphml/d/d1c30860-8dde-11ee-8b81-5b5a5262c942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.135 + 100.64.29.135 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701169863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d1c30860-8dde-11ee-8b81-5b5a5262c942 + + + diff --git a/graph/incidents_graphml/d/d1c8c610-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d1c8c610-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c5e4eb57c88768307dcabf14019a9490592cbc3 --- /dev/null +++ b/graph/incidents_graphml/d/d1c8c610-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.187 + 100.64.30.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330163 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d1c8c610-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d1d242c0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/d/d1d242c0-f286-11ec-babd-d5ed2eda1ac6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12d49fd6e182b4a3425ca41d847a9bea58099892 --- /dev/null +++ b/graph/incidents_graphml/d/d1d242c0-f286-11ec-babd-d5ed2eda1ac6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.106 + 100.64.81.106 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.156 + 100.64.72.156 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655942140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1d242c0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655942140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1d242c0-f286-11ec-babd-d5ed2eda1ac6 + + + diff --git a/graph/incidents_graphml/d/d1d48170-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/d/d1d48170-29ad-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d00596e5cefa9b7eb4c09f09eb403382ec38aa06 --- /dev/null +++ b/graph/incidents_graphml/d/d1d48170-29ad-11ee-9959-8506340212c8.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.188 + 100.64.25.188 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690153702 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1d48170-29ad-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690153702 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1d48170-29ad-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/d/d1d4e2b0-8dde-11ee-8b81-5b5a5262c942.graphml b/graph/incidents_graphml/d/d1d4e2b0-8dde-11ee-8b81-5b5a5262c942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e88147a5a9e83cf9f38e76c6bf336f89842dedbb --- /dev/null +++ b/graph/incidents_graphml/d/d1d4e2b0-8dde-11ee-8b81-5b5a5262c942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.181 + 100.64.16.181 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701169863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d1d4e2b0-8dde-11ee-8b81-5b5a5262c942 + + + diff --git a/graph/incidents_graphml/d/d1d9c860-2dc6-11ef-976a-4f91a87d18f6.graphml b/graph/incidents_graphml/d/d1d9c860-2dc6-11ef-976a-4f91a87d18f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61c316b12d82ae7f48457944f078912c8492c066 --- /dev/null +++ b/graph/incidents_graphml/d/d1d9c860-2dc6-11ef-976a-4f91a87d18f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.86 + 100.64.52.86 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718751742 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d1d9c860-2dc6-11ef-976a-4f91a87d18f6 + + + diff --git a/graph/incidents_graphml/d/d1dbad60-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/d/d1dbad60-29ad-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9fb79b08b9aa9e04226f13cf3dc8c5b0a8da307 --- /dev/null +++ b/graph/incidents_graphml/d/d1dbad60-29ad-11ee-9959-8506340212c8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.25.188 + 100.64.25.188 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690153702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d1dbad60-29ad-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/d/d1dbfff0-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d1dbfff0-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4687038cb4858455b1382f4ec8a5c870533a92ac --- /dev/null +++ b/graph/incidents_graphml/d/d1dbfff0-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.48 + 100.64.14.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330163 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d1dbfff0-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d1ea8d90-8dde-11ee-8b81-5b5a5262c942.graphml b/graph/incidents_graphml/d/d1ea8d90-8dde-11ee-8b81-5b5a5262c942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a881930e440a365160d73e264229a21374044494 --- /dev/null +++ b/graph/incidents_graphml/d/d1ea8d90-8dde-11ee-8b81-5b5a5262c942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.181 + 100.64.16.181 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701169864 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d1ea8d90-8dde-11ee-8b81-5b5a5262c942 + + + diff --git a/graph/incidents_graphml/d/d1f862a0-14b0-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/d/d1f862a0-14b0-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64ce552ba8ef9448906e24b3cf7063354a8aa575 --- /dev/null +++ b/graph/incidents_graphml/d/d1f862a0-14b0-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.134 + 100.64.79.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.220 + 100.64.71.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687846016 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1f862a0-14b0-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846016 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d1f862a0-14b0-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/d/d203e3b0-2031-11ed-9c49-d577d9b7e617.graphml b/graph/incidents_graphml/d/d203e3b0-2031-11ed-9c49-d577d9b7e617.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55747222dff489739c6593faf218c33edc657589 --- /dev/null +++ b/graph/incidents_graphml/d/d203e3b0-2031-11ed-9c49-d577d9b7e617.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.180 + 100.64.72.180 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660963386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d203e3b0-2031-11ed-9c49-d577d9b7e617 + + + diff --git a/graph/incidents_graphml/d/d2082810-33d3-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/d2082810-33d3-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5acd7ebd4b3d87af0fd402dceacaea5bb90dcdeb --- /dev/null +++ b/graph/incidents_graphml/d/d2082810-33d3-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,179 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.194 + 100.64.46.194 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.195 + 100.64.46.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.196 + 100.64.46.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.18 + 100.64.6.18 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691269535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2082810-33d3-11ee-9106-1db75c7cc651 + + + INCIDENT_LINK + 1691269535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2082810-33d3-11ee-9106-1db75c7cc651 + + + INCIDENT_LINK + 1691269535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2082810-33d3-11ee-9106-1db75c7cc651 + + + INCIDENT_LINK + 1691269535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2082810-33d3-11ee-9106-1db75c7cc651 + + + INCIDENT_LINK + 1691269535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2082810-33d3-11ee-9106-1db75c7cc651 + + + INCIDENT_LINK + 1691269535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2082810-33d3-11ee-9106-1db75c7cc651 + + + INCIDENT_LINK + 1691269535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2082810-33d3-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/d2093040-6a8b-11ee-9f6c-8bd579635c47.graphml b/graph/incidents_graphml/d/d2093040-6a8b-11ee-9f6c-8bd579635c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8ff5fb730111af841d6d5752818c3e3bb0910ab --- /dev/null +++ b/graph/incidents_graphml/d/d2093040-6a8b-11ee-9f6c-8bd579635c47.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.59 + HOST-2863 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697285925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2093040-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2093040-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2093040-6a8b-11ee-9f6c-8bd579635c47 + + + diff --git a/graph/incidents_graphml/d/d20d80a0-2031-11ed-9c49-d577d9b7e617.graphml b/graph/incidents_graphml/d/d20d80a0-2031-11ed-9c49-d577d9b7e617.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a365ac867eceaa3fe9f32f49637dd594ee0bd4e1 --- /dev/null +++ b/graph/incidents_graphml/d/d20d80a0-2031-11ed-9c49-d577d9b7e617.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.180 + 100.64.72.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660963386 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d20d80a0-2031-11ed-9c49-d577d9b7e617 + + + diff --git a/graph/incidents_graphml/d/d2237e40-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/d2237e40-6e29-11ee-b3d5-39e2e796f8b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef791b12c16718d99a91ca9343973ea95263544b --- /dev/null +++ b/graph/incidents_graphml/d/d2237e40-6e29-11ee-b3d5-39e2e796f8b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.192 + 100.64.51.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697683639 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d2237e40-6e29-11ee-b3d5-39e2e796f8b3 + + + diff --git a/graph/incidents_graphml/d/d225e8e0-8dde-11ee-8b81-5b5a5262c942.graphml b/graph/incidents_graphml/d/d225e8e0-8dde-11ee-8b81-5b5a5262c942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1320f32a13b586ed20280cb38eac5ab76997f089 --- /dev/null +++ b/graph/incidents_graphml/d/d225e8e0-8dde-11ee-8b81-5b5a5262c942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.28 + USER-0015-1345.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701169864 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d225e8e0-8dde-11ee-8b81-5b5a5262c942 + + + diff --git a/graph/incidents_graphml/d/d239bf00-8dde-11ee-8b81-5b5a5262c942.graphml b/graph/incidents_graphml/d/d239bf00-8dde-11ee-8b81-5b5a5262c942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6ee45d432c45daaacd013161beb360caebbe028 --- /dev/null +++ b/graph/incidents_graphml/d/d239bf00-8dde-11ee-8b81-5b5a5262c942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.28 + USER-0015-1345.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701169864 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d239bf00-8dde-11ee-8b81-5b5a5262c942 + + + diff --git a/graph/incidents_graphml/d/d240eb50-33d3-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/d240eb50-33d3-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a807e76e4f02a9933ef73b472e0ebdc0c718ada3 --- /dev/null +++ b/graph/incidents_graphml/d/d240eb50-33d3-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.194 + 100.64.46.194 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691269535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d240eb50-33d3-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/d2422820-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/d/d2422820-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7810210e9a824e4197fe573f5b0ab3fe96c8827a --- /dev/null +++ b/graph/incidents_graphml/d/d2422820-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.86 + 100.64.94.86 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696198439 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d2422820-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/d/d244b2a0-6a8b-11ee-9f6c-8bd579635c47.graphml b/graph/incidents_graphml/d/d244b2a0-6a8b-11ee-9f6c-8bd579635c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db4002e04f13befc70f20ffbd2701452a78c2dce --- /dev/null +++ b/graph/incidents_graphml/d/d244b2a0-6a8b-11ee-9f6c-8bd579635c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.63 + 100.64.8.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697285925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d244b2a0-6a8b-11ee-9f6c-8bd579635c47 + + + diff --git a/graph/incidents_graphml/d/d2464220-8dde-11ee-8b81-5b5a5262c942.graphml b/graph/incidents_graphml/d/d2464220-8dde-11ee-8b81-5b5a5262c942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb3e35b78b0a8df6fa2b493ab7abf6a0074dab22 --- /dev/null +++ b/graph/incidents_graphml/d/d2464220-8dde-11ee-8b81-5b5a5262c942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.64 + 100.64.36.64 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701169864 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2464220-8dde-11ee-8b81-5b5a5262c942 + + + diff --git a/graph/incidents_graphml/d/d251aaf0-6a8b-11ee-9f6c-8bd579635c47.graphml b/graph/incidents_graphml/d/d251aaf0-6a8b-11ee-9f6c-8bd579635c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f09007c3ff0844ee4256bf6cd6b7ce4ad452aa91 --- /dev/null +++ b/graph/incidents_graphml/d/d251aaf0-6a8b-11ee-9f6c-8bd579635c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.63 + 100.64.8.63 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697285925 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d251aaf0-6a8b-11ee-9f6c-8bd579635c47 + + + diff --git a/graph/incidents_graphml/d/d251b880-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/d/d251b880-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9d379af9b0e91ff6d9db04d0fdd60b22a5e9e31 --- /dev/null +++ b/graph/incidents_graphml/d/d251b880-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.86 + 100.64.94.86 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696198440 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d251b880-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/d/d258e370-2dc6-11ef-976a-4f91a87d18f6.graphml b/graph/incidents_graphml/d/d258e370-2dc6-11ef-976a-4f91a87d18f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f70508ac364a272eb2cfa74fad6d7afaec06d22 --- /dev/null +++ b/graph/incidents_graphml/d/d258e370-2dc6-11ef-976a-4f91a87d18f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager"] + + + HOST + 100.64.1.77 + 100.64.1.77 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718751742 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d258e370-2dc6-11ef-976a-4f91a87d18f6 + + + diff --git a/graph/incidents_graphml/d/d25db8e0-6a8b-11ee-9f6c-8bd579635c47.graphml b/graph/incidents_graphml/d/d25db8e0-6a8b-11ee-9f6c-8bd579635c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e5e37f73a77bf19ba60e5f6019d8367971e89ac --- /dev/null +++ b/graph/incidents_graphml/d/d25db8e0-6a8b-11ee-9f6c-8bd579635c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.65 + 100.64.8.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697285925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d25db8e0-6a8b-11ee-9f6c-8bd579635c47 + + + diff --git a/graph/incidents_graphml/d/d2682010-09b3-11ef-9ef0-737536dee9f3.graphml b/graph/incidents_graphml/d/d2682010-09b3-11ef-9ef0-737536dee9f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d56cd14b51a6ca51db45666a5e3c5d75a620e0fe --- /dev/null +++ b/graph/incidents_graphml/d/d2682010-09b3-11ef-9ef0-737536dee9f3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.156 + 100.64.22.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.84 + 100.64.64.84 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2682010-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2682010-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2682010-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2682010-09b3-11ef-9ef0-737536dee9f3 + + + diff --git a/graph/incidents_graphml/d/d26861b0-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/d26861b0-efe8-11ec-a293-5b334d10f0f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..73f028a9ce5b23fe101a4bce4fb6d2ed9e426c11 --- /dev/null +++ b/graph/incidents_graphml/d/d26861b0-efe8-11ec-a293-5b334d10f0f6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.183 + 100.64.81.183 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.246 + 100.64.76.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.40.6 + USER-0015-1901.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655654378 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d26861b0-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654378 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d26861b0-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654378 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d26861b0-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654378 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d26861b0-efe8-11ec-a293-5b334d10f0f6 + + + diff --git a/graph/incidents_graphml/d/d26ad840-6a8b-11ee-9f6c-8bd579635c47.graphml b/graph/incidents_graphml/d/d26ad840-6a8b-11ee-9f6c-8bd579635c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66d996a072c7450ec2089e84030d6c7803e073b7 --- /dev/null +++ b/graph/incidents_graphml/d/d26ad840-6a8b-11ee-9f6c-8bd579635c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.65 + 100.64.8.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697285925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d26ad840-6a8b-11ee-9f6c-8bd579635c47 + + + diff --git a/graph/incidents_graphml/d/d26d99d0-ed78-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/d/d26d99d0-ed78-11ed-a662-a9c0e7c292a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a766ee48a7c4dc2189b4655d0461e80baff85785 --- /dev/null +++ b/graph/incidents_graphml/d/d26d99d0-ed78-11ed-a662-a9c0e7c292a4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.185 + 100.64.68.185 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1683533870 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d26d99d0-ed78-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683533870 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d26d99d0-ed78-11ed-a662-a9c0e7c292a4 + + + diff --git a/graph/incidents_graphml/d/d2747c20-09b3-11ef-9ef0-737536dee9f3.graphml b/graph/incidents_graphml/d/d2747c20-09b3-11ef-9ef0-737536dee9f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8345c6b5476f8c8da7e49c39cf625158b8805f9 --- /dev/null +++ b/graph/incidents_graphml/d/d2747c20-09b3-11ef-9ef0-737536dee9f3.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.86 + 100.64.64.86 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.162 + 100.64.17.162 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.29 + 100.64.22.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2747c20-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2747c20-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2747c20-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2747c20-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2747c20-09b3-11ef-9ef0-737536dee9f3 + + + INCIDENT_LINK + 1714785340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2747c20-09b3-11ef-9ef0-737536dee9f3 + + + diff --git a/graph/incidents_graphml/d/d27f1dc0-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d27f1dc0-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..785b73c0c2ae2909c74174826086eb24970d533c --- /dev/null +++ b/graph/incidents_graphml/d/d27f1dc0-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.84 + 100.64.50.84 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330164 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d27f1dc0-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d2859510-8dde-11ee-8b81-5b5a5262c942.graphml b/graph/incidents_graphml/d/d2859510-8dde-11ee-8b81-5b5a5262c942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82269f2b133969bf4df73512fd3f3b0b467f7678 --- /dev/null +++ b/graph/incidents_graphml/d/d2859510-8dde-11ee-8b81-5b5a5262c942.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.178 + 100.64.11.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701169865 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2859510-8dde-11ee-8b81-5b5a5262c942 + + + INCIDENT_LINK + 1701169865 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2859510-8dde-11ee-8b81-5b5a5262c942 + + + diff --git a/graph/incidents_graphml/d/d2879490-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/d/d2879490-017b-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6905a546aa93554a9e7d270591a3668bed1b6fe --- /dev/null +++ b/graph/incidents_graphml/d/d2879490-017b-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.217 + 100.64.79.217 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685734182 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2879490-017b-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/d/d2897e40-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/d2897e40-efe8-11ec-a293-5b334d10f0f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..911d0300b751178debf25df8ee3dabd058d90879 --- /dev/null +++ b/graph/incidents_graphml/d/d2897e40-efe8-11ec-a293-5b334d10f0f6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.184 + 100.64.81.184 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.216 + USER-0015-1902.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.217 + 100.64.75.217 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655654378 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2897e40-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654378 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2897e40-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654378 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2897e40-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654378 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2897e40-efe8-11ec-a293-5b334d10f0f6 + + + diff --git a/graph/incidents_graphml/d/d28c6a00-6a8b-11ee-9f6c-8bd579635c47.graphml b/graph/incidents_graphml/d/d28c6a00-6a8b-11ee-9f6c-8bd579635c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..258cfca5b58b6a66de1e076803aec46b58f882a6 --- /dev/null +++ b/graph/incidents_graphml/d/d28c6a00-6a8b-11ee-9f6c-8bd579635c47.graphml @@ -0,0 +1,835 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.67 + 100.64.8.67 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.68 + 100.64.8.68 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.69 + 100.64.8.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.70 + 100.64.8.70 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.71 + 100.64.8.71 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.72 + 100.64.8.72 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.10 + 100.64.8.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.73 + 100.64.8.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.74 + 100.64.8.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.75 + 100.64.8.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.76 + 100.64.8.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.77 + 100.64.8.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.78 + 100.64.8.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.79 + 100.64.8.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.80 + 100.64.8.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.81 + 100.64.8.81 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.82 + 100.64.8.82 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.83 + 100.64.8.83 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + INCIDENT_LINK + 1697285926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d28c6a00-6a8b-11ee-9f6c-8bd579635c47 + + + diff --git a/graph/incidents_graphml/d/d28ccdd0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/d/d28ccdd0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0a7268d3398547f155715cbc3276d3c6ef01e53 --- /dev/null +++ b/graph/incidents_graphml/d/d28ccdd0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.91 + 100.64.78.91 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.167 + 100.64.72.167 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657069140 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d28ccdd0-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069140 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d28ccdd0-fcc6-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/d/d2964f40-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d2964f40-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37fe1d6cef8af56da47e6f0819f1ed9015b7988a --- /dev/null +++ b/graph/incidents_graphml/d/d2964f40-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.84 + 100.64.50.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330164 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2964f40-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d2a4b850-0b7e-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/d/d2a4b850-0b7e-11ef-b87c-0d8b17cd9fbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b43659c15a6c18762f3d26d354a7441bfb480b98 --- /dev/null +++ b/graph/incidents_graphml/d/d2a4b850-0b7e-11ef-b87c-0d8b17cd9fbf.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.53.239 + 172.24.53.239 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.94.146 + 100.64.94.146 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714982480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d2a4b850-0b7e-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714982480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d2a4b850-0b7e-11ef-b87c-0d8b17cd9fbf + + + diff --git a/graph/incidents_graphml/d/d2a67c20-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/d2a67c20-efe8-11ec-a293-5b334d10f0f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ccc57357c4eb374e361086ac9256c0c09239c5f --- /dev/null +++ b/graph/incidents_graphml/d/d2a67c20-efe8-11ec-a293-5b334d10f0f6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.185 + 100.64.81.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.222 + 100.64.71.222 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.186 + 100.64.81.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655654378 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2a67c20-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654378 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2a67c20-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654378 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2a67c20-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654378 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2a67c20-efe8-11ec-a293-5b334d10f0f6 + + + diff --git a/graph/incidents_graphml/d/d2adf5f0-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d2adf5f0-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2dc91be4e9c211575d62cf08f176f06931bd47e --- /dev/null +++ b/graph/incidents_graphml/d/d2adf5f0-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.109 + 100.64.34.109 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330164 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2adf5f0-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d2ae3720-1814-11ef-a290-d5e92fd7ebc0.graphml b/graph/incidents_graphml/d/d2ae3720-1814-11ef-a290-d5e92fd7ebc0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13fcfb306474c18b5d73c1847da904aa4204e880 --- /dev/null +++ b/graph/incidents_graphml/d/d2ae3720-1814-11ef-a290-d5e92fd7ebc0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.17 + 100.64.24.17 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1716366318 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2ae3720-1814-11ef-a290-d5e92fd7ebc0 + + + diff --git a/graph/incidents_graphml/d/d2b80480-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/d/d2b80480-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a425572f3fe95e619ac893915a717745c31f1754 --- /dev/null +++ b/graph/incidents_graphml/d/d2b80480-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.62 + 100.64.24.62 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175712 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2b80480-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/d/d2bebed0-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d2bebed0-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b5db86b47a83c864f864a02648b02ccae43ef3a --- /dev/null +++ b/graph/incidents_graphml/d/d2bebed0-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.182 + 100.64.27.182 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330164 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2bebed0-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d2bfc350-1814-11ef-a290-d5e92fd7ebc0.graphml b/graph/incidents_graphml/d/d2bfc350-1814-11ef-a290-d5e92fd7ebc0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aac1ffe2cc985a0c6cf69ab91c0fb0d4bd74dd84 --- /dev/null +++ b/graph/incidents_graphml/d/d2bfc350-1814-11ef-a290-d5e92fd7ebc0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.24.17 + 100.64.24.17 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716366318 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2bfc350-1814-11ef-a290-d5e92fd7ebc0 + + + diff --git a/graph/incidents_graphml/d/d2c73700-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/d/d2c73700-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abd2b792755fb54840cada62a822114db0813b8a --- /dev/null +++ b/graph/incidents_graphml/d/d2c73700-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.76 + 100.64.57.76 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685492805 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2c73700-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/d/d2c794e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/d/d2c794e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9f4772500e12a38f2e6af955b5881c6d5b95315 --- /dev/null +++ b/graph/incidents_graphml/d/d2c794e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.62 + 100.64.24.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175712 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2c794e0-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/d/d2c9a650-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d2c9a650-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e395df758045d8506852c3ee4bdbb32b5b591ea7 --- /dev/null +++ b/graph/incidents_graphml/d/d2c9a650-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.100 + 100.64.44.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1665753994 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2c9a650-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d2cd01b0-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d2cd01b0-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e2bbb8ecc1d9eeb7a0e0b4af4eb7055ad59d8d6 --- /dev/null +++ b/graph/incidents_graphml/d/d2cd01b0-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.44.100 + 100.64.44.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1665753994 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2cd01b0-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d2cdf440-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/d/d2cdf440-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f073fd95b271ce7c0cbf05c90b764230c0a3b8a --- /dev/null +++ b/graph/incidents_graphml/d/d2cdf440-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.114 + 100.64.93.114 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721029794 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d2cdf440-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/d/d2ceeb70-6af2-11ee-a1d0-451bf8083340.graphml b/graph/incidents_graphml/d/d2ceeb70-6af2-11ee-a1d0-451bf8083340.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7ba6b48fe5eb7669b1f30f6b3bf3903b8894038 --- /dev/null +++ b/graph/incidents_graphml/d/d2ceeb70-6af2-11ee-a1d0-451bf8083340.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.182 + 100.64.27.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697330164 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2ceeb70-6af2-11ee-a1d0-451bf8083340 + + + diff --git a/graph/incidents_graphml/d/d2cf46d0-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/d/d2cf46d0-f75e-11ee-a8c3-edac19687c67.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b87098c1d298201c5a334c0e2d1929c78591a4c --- /dev/null +++ b/graph/incidents_graphml/d/d2cf46d0-f75e-11ee-a8c3-edac19687c67.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.147 + 100.64.68.147 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1712769713 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2cf46d0-f75e-11ee-a8c3-edac19687c67 + + + diff --git a/graph/incidents_graphml/d/d2d205f0-f75e-11ee-a8c3-edac19687c67.graphml b/graph/incidents_graphml/d/d2d205f0-f75e-11ee-a8c3-edac19687c67.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3aeb8ae914adfc7c6c3ac0a28c08adc3c87c69cf --- /dev/null +++ b/graph/incidents_graphml/d/d2d205f0-f75e-11ee-a8c3-edac19687c67.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.147 + 100.64.68.147 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712769713 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2d205f0-f75e-11ee-a8c3-edac19687c67 + + + diff --git a/graph/incidents_graphml/d/d2d20ac0-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d2d20ac0-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0731bc88d5afbc41d1a648fbd759316d2b2a992 --- /dev/null +++ b/graph/incidents_graphml/d/d2d20ac0-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.109 + 100.64.87.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1665753994 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2d20ac0-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d2da1e10-33d3-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/d2da1e10-33d3-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cccdd370eeae4cf7423c02883a83054ba6fbca9d --- /dev/null +++ b/graph/incidents_graphml/d/d2da1e10-33d3-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691269536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d2da1e10-33d3-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/d2db1ce0-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/d/d2db1ce0-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3073676cdefc15fbb0e5de4616b05233aac77d47 --- /dev/null +++ b/graph/incidents_graphml/d/d2db1ce0-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.64 + USER-0015-1247.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175712 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d2db1ce0-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/d/d2dce030-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d2dce030-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e1b9357a6ee1ca4cd5679220dd2ded586d5d34b --- /dev/null +++ b/graph/incidents_graphml/d/d2dce030-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.107 + 100.64.87.107 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1665753994 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2dce030-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d2dfe5b0-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d2dfe5b0-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cc5c9e7938434071c2a9e6437c482acd651163e --- /dev/null +++ b/graph/incidents_graphml/d/d2dfe5b0-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.45 + 100.64.17.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962287 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2dfe5b0-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d2e03d40-ff49-11ed-a0f1-e9dc61d1c5b8.graphml b/graph/incidents_graphml/d/d2e03d40-ff49-11ed-a0f1-e9dc61d1c5b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b359dcc40c93abcd5326102f68d4b7d98fb73e28 --- /dev/null +++ b/graph/incidents_graphml/d/d2e03d40-ff49-11ed-a0f1-e9dc61d1c5b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.57.76 + 100.64.57.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685492805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d2e03d40-ff49-11ed-a0f1-e9dc61d1c5b8 + + + diff --git a/graph/incidents_graphml/d/d2e1e860-0b7e-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/d/d2e1e860-0b7e-11ef-b87c-0d8b17cd9fbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1d14bca9b6609f8853252bbf21e427750971058 --- /dev/null +++ b/graph/incidents_graphml/d/d2e1e860-0b7e-11ef-b87c-0d8b17cd9fbf.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.107.215 + 172.21.107.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.148 + 100.64.94.148 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714982480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2e1e860-0b7e-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714982480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2e1e860-0b7e-11ef-b87c-0d8b17cd9fbf + + + diff --git a/graph/incidents_graphml/d/d2e36fe0-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d2e36fe0-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c9a0b0b5aec1d8950cab799d93074c9ce9fc099 --- /dev/null +++ b/graph/incidents_graphml/d/d2e36fe0-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.107 + 100.64.87.107 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1665753994 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2e36fe0-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d2ec33e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/d/d2ec33e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3075caaadaf1f836ffe5c4c75e8c1bdac40e7bc9 --- /dev/null +++ b/graph/incidents_graphml/d/d2ec33e0-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.59 + 100.64.13.59 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175712 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2ec33e0-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/d/d2ec9fd0-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/d/d2ec9fd0-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61817eb12056dba426cad161c5f949a34825ad4e --- /dev/null +++ b/graph/incidents_graphml/d/d2ec9fd0-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.114 + 100.64.93.114 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721029794 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2ec9fd0-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/d/d2ef7f20-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/d/d2ef7f20-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df1a91da3310bbb850a9ef1a4f3269491c633f9b --- /dev/null +++ b/graph/incidents_graphml/d/d2ef7f20-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.145 + 100.64.53.145 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696198441 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2ef7f20-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/d/d2efd9d0-0373-11ed-8991-41244357ae3d.graphml b/graph/incidents_graphml/d/d2efd9d0-0373-11ed-8991-41244357ae3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4ef313f2c414e8bba925a73dbed73f028d93ea2 --- /dev/null +++ b/graph/incidents_graphml/d/d2efd9d0-0373-11ed-8991-41244357ae3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.47 + 100.64.77.47 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.196 + 100.64.72.196 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657803151 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d2efd9d0-0373-11ed-8991-41244357ae3d + + + diff --git a/graph/incidents_graphml/d/d2f4d200-33d3-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/d2f4d200-33d3-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcabedd3435be304f5a64ecd39f09bd9bf3b33b3 --- /dev/null +++ b/graph/incidents_graphml/d/d2f4d200-33d3-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691269536 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d2f4d200-33d3-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/d2fbc590-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d2fbc590-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7dcc82c1d176da24c41704f768f07994a8550b34 --- /dev/null +++ b/graph/incidents_graphml/d/d2fbc590-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.223 + 100.64.13.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944774 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d2fbc590-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d3004ee0-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/d/d3004ee0-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9834ab8026c7efccd0f42b16d701e1b171bdcdaa --- /dev/null +++ b/graph/incidents_graphml/d/d3004ee0-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.229.166 + USER-0015-2103.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.86.163 + 100.64.86.163 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721029794 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3004ee0-427e-11ef-ab73-b9dc9970dec3 + + + INCIDENT_LINK + 1721029794 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3004ee0-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/d/d30358c0-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/d/d30358c0-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f460d9bc1b3684794e2a266fb7f59ded0bf3a5a --- /dev/null +++ b/graph/incidents_graphml/d/d30358c0-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.33 + 100.64.91.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695779252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d30358c0-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/d/d303a360-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/d/d303a360-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d9d5435fb116108d4b79d4f1c1e1c02f5c978c9 --- /dev/null +++ b/graph/incidents_graphml/d/d303a360-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.53.145 + 100.64.53.145 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696198441 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d303a360-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/d/d30af4a0-7135-11ee-bce1-87535eed5229.graphml b/graph/incidents_graphml/d/d30af4a0-7135-11ee-bce1-87535eed5229.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8deec178fffa8061aa4e570130e413a58bfe5b5b --- /dev/null +++ b/graph/incidents_graphml/d/d30af4a0-7135-11ee-bce1-87535eed5229.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.76 + 100.64.20.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698018648 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d30af4a0-7135-11ee-bce1-87535eed5229 + + + diff --git a/graph/incidents_graphml/d/d30cb580-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d30cb580-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b95604d66705335e5312140e6a190f2c878e1eeb --- /dev/null +++ b/graph/incidents_graphml/d/d30cb580-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.223 + 100.64.13.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944774 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d30cb580-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d30d5d10-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/d/d30d5d10-0823-11ee-af5c-6f7331aea810.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cab3340ce52321948e993db31d3dcc7f75c229da --- /dev/null +++ b/graph/incidents_graphml/d/d30d5d10-0823-11ee-af5c-6f7331aea810.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.99 + 100.64.38.99 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686466045 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d30d5d10-0823-11ee-af5c-6f7331aea810 + + + diff --git a/graph/incidents_graphml/d/d311b0a0-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/d/d311b0a0-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..937ec1eda9a17bef23b70564aaa3b55aa03db7ae --- /dev/null +++ b/graph/incidents_graphml/d/d311b0a0-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.33 + 100.64.91.33 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695779252 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d311b0a0-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/d/d3136440-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/d/d3136440-533c-11ed-82ec-e7a72760a0c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc4c60879acdae273ffdfe652c8e9f35d19c50f1 --- /dev/null +++ b/graph/incidents_graphml/d/d3136440-533c-11ed-82ec-e7a72760a0c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.55 + 100.64.95.55 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1666575622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3136440-533c-11ed-82ec-e7a72760a0c9 + + + diff --git a/graph/incidents_graphml/d/d3168f20-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/d/d3168f20-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9159c6b5050636a1a4b42a4ce147637a1a854723 --- /dev/null +++ b/graph/incidents_graphml/d/d3168f20-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696198441 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3168f20-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/d/d31a9830-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d31a9830-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c46ec67de3d9078aef3872bda5d7b121d88ff323 --- /dev/null +++ b/graph/incidents_graphml/d/d31a9830-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.53 + 100.64.23.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944775 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d31a9830-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d31aac10-7135-11ee-bce1-87535eed5229.graphml b/graph/incidents_graphml/d/d31aac10-7135-11ee-bce1-87535eed5229.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66b5d630af374a9705cac89962cd92afce5419f3 --- /dev/null +++ b/graph/incidents_graphml/d/d31aac10-7135-11ee-bce1-87535eed5229.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.76 + 100.64.20.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698018648 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d31aac10-7135-11ee-bce1-87535eed5229 + + + diff --git a/graph/incidents_graphml/d/d31b0c10-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/d/d31b0c10-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42ae8b83c01c8023a371c2dde3905ac22d2aa3f0 --- /dev/null +++ b/graph/incidents_graphml/d/d31b0c10-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175712 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d31b0c10-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/d/d31f3dc0-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d31f3dc0-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53467ff55d996f1f937ea4dcd8bfdf4cd9175803 --- /dev/null +++ b/graph/incidents_graphml/d/d31f3dc0-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.52 + 100.64.12.52 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d31f3dc0-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d32044c0-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/d/d32044c0-1c9b-11ee-baac-abb351177483.graphml new file mode 100644 index 0000000000000000000000000000000000000000..765d5a313bedb716ef01772627e277e15d9ed414 --- /dev/null +++ b/graph/incidents_graphml/d/d32044c0-1c9b-11ee-baac-abb351177483.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.194 + 100.64.14.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688716608 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d32044c0-1c9b-11ee-baac-abb351177483 + + + diff --git a/graph/incidents_graphml/d/d3240610-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/d/d3240610-533c-11ed-82ec-e7a72760a0c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9220dfbef9730df661bbdc83f74d014e75f5032 --- /dev/null +++ b/graph/incidents_graphml/d/d3240610-533c-11ed-82ec-e7a72760a0c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.55 + 100.64.95.55 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666575622 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3240610-533c-11ed-82ec-e7a72760a0c9 + + + diff --git a/graph/incidents_graphml/d/d329b360-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d329b360-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2f0ea83db958e1ff7c19b51eaa70d4c5200d96a --- /dev/null +++ b/graph/incidents_graphml/d/d329b360-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.53 + 100.64.23.53 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944775 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d329b360-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d32a6380-7135-11ee-bce1-87535eed5229.graphml b/graph/incidents_graphml/d/d32a6380-7135-11ee-bce1-87535eed5229.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a33d6b7582681efda6be5fa0befbcd6d5be4229e --- /dev/null +++ b/graph/incidents_graphml/d/d32a6380-7135-11ee-bce1-87535eed5229.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.110 + 100.64.64.110 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698018648 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d32a6380-7135-11ee-bce1-87535eed5229 + + + diff --git a/graph/incidents_graphml/d/d32b11a0-7bbb-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/d/d32b11a0-7bbb-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60f2e2ecc2aafb9433a1ffcb60d5cfcca1a12bcb --- /dev/null +++ b/graph/incidents_graphml/d/d32b11a0-7bbb-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699175712 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d32b11a0-7bbb-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/d/d3311810-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d3311810-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1493c63a3336da588be79dc2ad8e9b31af0640dd --- /dev/null +++ b/graph/incidents_graphml/d/d3311810-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.52 + 100.64.12.52 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3311810-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d33a3560-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/d/d33a3560-1c9b-11ee-baac-abb351177483.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61498a2b26a1ca5365a519c514a68c1d4be53705 --- /dev/null +++ b/graph/incidents_graphml/d/d33a3560-1c9b-11ee-baac-abb351177483.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.194 + 100.64.14.194 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688716608 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d33a3560-1c9b-11ee-baac-abb351177483 + + + diff --git a/graph/incidents_graphml/d/d33edd00-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/d33edd00-8559-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8008749b7777d99caafbf82d55e432f38fcd64d --- /dev/null +++ b/graph/incidents_graphml/d/d33edd00-8559-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.84 + 100.64.31.84 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700233133 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d33edd00-8559-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/d/d33f6990-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/d/d33f6990-0823-11ee-af5c-6f7331aea810.graphml new file mode 100644 index 0000000000000000000000000000000000000000..350c9f7315a4daa31f5cdc84f15cd55f7a033308 --- /dev/null +++ b/graph/incidents_graphml/d/d33f6990-0823-11ee-af5c-6f7331aea810.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686466045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d33f6990-0823-11ee-af5c-6f7331aea810 + + + diff --git a/graph/incidents_graphml/d/d33f7f80-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/d/d33f7f80-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b6cbbe2a2bcc10ab7cf2ac9b615e432996235db --- /dev/null +++ b/graph/incidents_graphml/d/d33f7f80-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.91 + 100.64.90.91 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.137 + 100.64.95.137 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673829822 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d33f7f80-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/d/d34713b0-4bc3-11ed-a9dc-41c408c26bdc.graphml b/graph/incidents_graphml/d/d34713b0-4bc3-11ed-a9dc-41c408c26bdc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8abb9104d4dedddd01668c0b8eebfbae4f20b1a --- /dev/null +++ b/graph/incidents_graphml/d/d34713b0-4bc3-11ed-a9dc-41c408c26bdc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.219 + 100.64.68.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1999.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1665753995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d34713b0-4bc3-11ed-a9dc-41c408c26bdc + + + diff --git a/graph/incidents_graphml/d/d3481d60-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d3481d60-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c0812892e708ff623c6b8e8d0fec90e136c7b00 --- /dev/null +++ b/graph/incidents_graphml/d/d3481d60-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962287 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3481d60-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d34ad650-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d34ad650-3170-11ef-ac7f-916edbe5b1d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..759f2c49f177e1898b79182561115284fa054c75 --- /dev/null +++ b/graph/incidents_graphml/d/d34ad650-3170-11ef-ac7f-916edbe5b1d5.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.242 + 100.64.59.242 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.254 + 100.64.8.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.177 + 100.64.26.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719154612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d34ad650-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d34ad650-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d34ad650-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d34ad650-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d34ad650-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d34ad650-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d34ad650-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d34ad650-3170-11ef-ac7f-916edbe5b1d5 + + + diff --git a/graph/incidents_graphml/d/d34c2780-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/d/d34c2780-533c-11ed-82ec-e7a72760a0c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69a3b3ec11499060a84dd28c9b53df2e30bf64e8 --- /dev/null +++ b/graph/incidents_graphml/d/d34c2780-533c-11ed-82ec-e7a72760a0c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.48 + 100.64.18.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1666575622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d34c2780-533c-11ed-82ec-e7a72760a0c9 + + + diff --git a/graph/incidents_graphml/d/d34c7ec0-1230-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/d/d34c7ec0-1230-11ee-a890-99c329874409.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edf7600aa5e73682bb14718bc2812064632fa375 --- /dev/null +++ b/graph/incidents_graphml/d/d34c7ec0-1230-11ee-a890-99c329874409.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.45 + 100.64.39.45 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687571140 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d34c7ec0-1230-11ee-a890-99c329874409 + + + diff --git a/graph/incidents_graphml/d/d34daa10-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/d34daa10-8559-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b94ceb8c83562cf92550fa4fa47b3ba20b348111 --- /dev/null +++ b/graph/incidents_graphml/d/d34daa10-8559-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.84 + 100.64.31.84 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700233133 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d34daa10-8559-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/d/d3512620-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/d/d3512620-017b-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ab0c6cfd5a536d29cced3a9ebf9d9ccbd9831bb --- /dev/null +++ b/graph/incidents_graphml/d/d3512620-017b-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.179 + 100.64.75.179 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.77.12 + 100.64.77.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685734183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3512620-017b-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/d/d354a080-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d354a080-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..802378d7e8a7eeff3665c4b17f8f7fed598aed54 --- /dev/null +++ b/graph/incidents_graphml/d/d354a080-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962287 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d354a080-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d3586ae0-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d3586ae0-3170-11ef-ac7f-916edbe5b1d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcdde933e92e794c19a0bdbe4176d8ff771b67e0 --- /dev/null +++ b/graph/incidents_graphml/d/d3586ae0-3170-11ef-ac7f-916edbe5b1d5.graphml @@ -0,0 +1,581 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.69 + 100.64.31.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.244 + 100.64.59.244 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.245 + 100.64.59.245 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.246 + 100.64.59.246 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.45 + 100.64.13.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.247 + USER-0015-1436.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.248 + 100.64.59.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.3 + 100.64.44.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.101 + 100.64.17.101 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.104 + 100.64.52.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.249 + 100.64.59.249 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.250 + 100.64.59.250 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.251 + 100.64.59.251 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3586ae0-3170-11ef-ac7f-916edbe5b1d5 + + + diff --git a/graph/incidents_graphml/d/d3588390-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/d/d3588390-533c-11ed-82ec-e7a72760a0c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..460e2eb7fc5103d0a2b560cb35d8f6736e9f3573 --- /dev/null +++ b/graph/incidents_graphml/d/d3588390-533c-11ed-82ec-e7a72760a0c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.18.48 + 100.64.18.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1666575622 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3588390-533c-11ed-82ec-e7a72760a0c9 + + + diff --git a/graph/incidents_graphml/d/d35d78e0-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/d/d35d78e0-0823-11ee-af5c-6f7331aea810.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84753142420ef022372adfe21612c0969ff24ba0 --- /dev/null +++ b/graph/incidents_graphml/d/d35d78e0-0823-11ee-af5c-6f7331aea810.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686466045 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d35d78e0-0823-11ee-af5c-6f7331aea810 + + + diff --git a/graph/incidents_graphml/d/d360eb20-0373-11ed-8991-41244357ae3d.graphml b/graph/incidents_graphml/d/d360eb20-0373-11ed-8991-41244357ae3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60fc528cc2894cce8e471dcee29b8133484ab95a --- /dev/null +++ b/graph/incidents_graphml/d/d360eb20-0373-11ed-8991-41244357ae3d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.55 + 100.64.13.55 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657803152 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d360eb20-0373-11ed-8991-41244357ae3d + + + INCIDENT_LINK + 1657803152 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d360eb20-0373-11ed-8991-41244357ae3d + + + diff --git a/graph/incidents_graphml/d/d36171c0-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d36171c0-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d113627f297b129ba3718908a5f7bbeeed7ed106 --- /dev/null +++ b/graph/incidents_graphml/d/d36171c0-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.47 + 100.64.17.47 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962287 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d36171c0-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d363aa40-0373-11ed-8991-41244357ae3d.graphml b/graph/incidents_graphml/d/d363aa40-0373-11ed-8991-41244357ae3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..391484396183bb47496e918d59fe95305e6d7c5c --- /dev/null +++ b/graph/incidents_graphml/d/d363aa40-0373-11ed-8991-41244357ae3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.92 + 100.64.74.92 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.228 + 100.64.71.228 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657803152 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d363aa40-0373-11ed-8991-41244357ae3d + + + diff --git a/graph/incidents_graphml/d/d364ee00-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d364ee00-3170-11ef-ac7f-916edbe5b1d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37551225225cde62c3e894c0aee061fcbbebbe2a --- /dev/null +++ b/graph/incidents_graphml/d/d364ee00-3170-11ef-ac7f-916edbe5b1d5.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.4 + 100.64.60.4 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.203 + 100.64.37.203 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719154612 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d364ee00-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d364ee00-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d364ee00-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d364ee00-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d364ee00-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d364ee00-3170-11ef-ac7f-916edbe5b1d5 + + + diff --git a/graph/incidents_graphml/d/d36a3ff0-1230-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/d/d36a3ff0-1230-11ee-a890-99c329874409.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c09ecb277e398505d5870b3919e53dc60576cc4 --- /dev/null +++ b/graph/incidents_graphml/d/d36a3ff0-1230-11ee-a890-99c329874409.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.45 + 100.64.39.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687571141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d36a3ff0-1230-11ee-a890-99c329874409 + + + diff --git a/graph/incidents_graphml/d/d36b64e0-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/d/d36b64e0-017b-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6ebb11db7a3e4adf8b3dd4d26827d03f5104b37 --- /dev/null +++ b/graph/incidents_graphml/d/d36b64e0-017b-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.12 + 100.64.19.12 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685734183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d36b64e0-017b-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/d/d3714a10-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d3714a10-3170-11ef-ac7f-916edbe5b1d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b590bdc3cacf6717b85709739b96324b1fdcec9f --- /dev/null +++ b/graph/incidents_graphml/d/d3714a10-3170-11ef-ac7f-916edbe5b1d5.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.217 + 100.64.31.217 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.149 + 100.64.3.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719154612 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3714a10-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3714a10-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3714a10-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154612 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3714a10-3170-11ef-ac7f-916edbe5b1d5 + + + diff --git a/graph/incidents_graphml/d/d374aba0-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d374aba0-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..237dc81d34e50151689f707f06cf068b3f23b66e --- /dev/null +++ b/graph/incidents_graphml/d/d374aba0-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.47 + 100.64.17.47 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d374aba0-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d380a9a0-3f8c-11ee-9b72-817daf89a87d.graphml b/graph/incidents_graphml/d/d380a9a0-3f8c-11ee-9b72-817daf89a87d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..190ce77d3d13aca582344381bc803c0b65ec105c --- /dev/null +++ b/graph/incidents_graphml/d/d380a9a0-3f8c-11ee-9b72-817daf89a87d.graphml @@ -0,0 +1,331 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.4 + 100.64.23.4 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.5 + 100.64.23.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.6 + 100.64.23.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.160 + 100.64.13.160 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.7 + 100.64.23.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.8 + 100.64.23.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + INCIDENT_LINK + 1692558457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d380a9a0-3f8c-11ee-9b72-817daf89a87d + + + diff --git a/graph/incidents_graphml/d/d38359b0-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/d/d38359b0-017b-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9058e847f0bebb44255bb8531b512b7773121eb --- /dev/null +++ b/graph/incidents_graphml/d/d38359b0-017b-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.19.12 + 100.64.19.12 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685734183 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d38359b0-017b-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/d/d385de40-1230-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/d/d385de40-1230-11ee-a890-99c329874409.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc2ceb6f4097cac1dfd318dfa1833f5d40da8cb8 --- /dev/null +++ b/graph/incidents_graphml/d/d385de40-1230-11ee-a890-99c329874409.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.47 + 100.64.39.47 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687571141 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d385de40-1230-11ee-a890-99c329874409 + + + INCIDENT_LINK + 1687571141 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d385de40-1230-11ee-a890-99c329874409 + + + diff --git a/graph/incidents_graphml/d/d3874940-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d3874940-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f49fde73aca4644de7063991dd26a2b23a68c334 --- /dev/null +++ b/graph/incidents_graphml/d/d3874940-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.49 + USER-0015-1212.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3874940-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d38ef370-60a7-11ee-a238-43fa5b505c3f.graphml b/graph/incidents_graphml/d/d38ef370-60a7-11ee-a238-43fa5b505c3f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed077a74be09aedb042ff3ac47839bb7f502004f --- /dev/null +++ b/graph/incidents_graphml/d/d38ef370-60a7-11ee-a238-43fa5b505c3f.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.103.13 + 192.168.103.13 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.88 + USER-0015-2113.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.89 + 100.64.94.89 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 192.168.43.19 + 192.168.43.19 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.90 + 100.64.94.90 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 192.168.35.179 + 192.168.35.179 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 192.168.180.115 + 192.168.180.115 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + INCIDENT_LINK + 1696198442 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d38ef370-60a7-11ee-a238-43fa5b505c3f + + + diff --git a/graph/incidents_graphml/d/d3937e40-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d3937e40-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..329e9ef55e19a5209a4bc1830dd026c2e720fee7 --- /dev/null +++ b/graph/incidents_graphml/d/d3937e40-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.49 + USER-0015-1212.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962288 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3937e40-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d39c5ff0-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/d/d39c5ff0-017b-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3554ca4c8eafcde94922f0febecc5ddcd14873b1 --- /dev/null +++ b/graph/incidents_graphml/d/d39c5ff0-017b-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.218 + 100.64.79.218 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685734183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d39c5ff0-017b-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/d/d39e7fd0-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d39e7fd0-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd7577999e671d2520db557b21b70c699cdb6b19 --- /dev/null +++ b/graph/incidents_graphml/d/d39e7fd0-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.107 + 100.64.10.107 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d39e7fd0-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d3ae7a60-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d3ae7a60-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fa1b949bcb192b4683eb138e79a6e84bfea15c7 --- /dev/null +++ b/graph/incidents_graphml/d/d3ae7a60-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.179 + 100.64.23.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974342 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3ae7a60-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d3bb3290-017b-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/d/d3bb3290-017b-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f26d5da25d33521412bba589678367b926359e5d --- /dev/null +++ b/graph/incidents_graphml/d/d3bb3290-017b-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.79.218 + 100.64.79.218 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685734184 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3bb3290-017b-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/d/d3c07940-cb9b-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/d/d3c07940-cb9b-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d977e6bcd20e286bca2171ac116ea50ee3249c33 --- /dev/null +++ b/graph/incidents_graphml/d/d3c07940-cb9b-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.140 + 100.64.13.140 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707958062 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3c07940-cb9b-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/d/d3c09940-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/d/d3c09940-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f8566781a094ab943cba11cd5afdf9cb2352c88 --- /dev/null +++ b/graph/incidents_graphml/d/d3c09940-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.15 + 100.64.32.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485380 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3c09940-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/d/d3ca0580-3877-11ee-b68a-37ae93e84217.graphml b/graph/incidents_graphml/d/d3ca0580-3877-11ee-b68a-37ae93e84217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85b6f6086c936b04c336e52513d614c8ce7cee5c --- /dev/null +++ b/graph/incidents_graphml/d/d3ca0580-3877-11ee-b68a-37ae93e84217.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691779780 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3ca0580-3877-11ee-b68a-37ae93e84217 + + + diff --git a/graph/incidents_graphml/d/d3ceaa10-cb9b-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/d/d3ceaa10-cb9b-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..549ce60c30288ada180a1ac97c6bf26beeeeecc6 --- /dev/null +++ b/graph/incidents_graphml/d/d3ceaa10-cb9b-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.140 + 100.64.13.140 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707958062 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3ceaa10-cb9b-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/d/d3d0c5e0-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/d/d3d0c5e0-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8c4df87a12c3849b64281a326a61e6f77d71a6d --- /dev/null +++ b/graph/incidents_graphml/d/d3d0c5e0-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.15 + 100.64.32.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485380 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3d0c5e0-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/d/d3d98200-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d3d98200-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92990f20ae7404c526252f0c503fa4c0ae0ebed8 --- /dev/null +++ b/graph/incidents_graphml/d/d3d98200-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.181 + 100.64.23.181 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974342 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3d98200-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d3dab100-0627-11ee-9c9b-212b090473a0.graphml b/graph/incidents_graphml/d/d3dab100-0627-11ee-9c9b-212b090473a0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a85fad88b6f9027b019328604e29bc2dd1a02065 --- /dev/null +++ b/graph/incidents_graphml/d/d3dab100-0627-11ee-9c9b-212b090473a0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.215 + USER-0015-1401.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686247862 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3dab100-0627-11ee-9c9b-212b090473a0 + + + diff --git a/graph/incidents_graphml/d/d3df8950-3877-11ee-b68a-37ae93e84217.graphml b/graph/incidents_graphml/d/d3df8950-3877-11ee-b68a-37ae93e84217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd833fec84d418deb0e5667b170ca4e6057c538a --- /dev/null +++ b/graph/incidents_graphml/d/d3df8950-3877-11ee-b68a-37ae93e84217.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691779780 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3df8950-3877-11ee-b68a-37ae93e84217 + + + diff --git a/graph/incidents_graphml/d/d3e58660-7e8c-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/d/d3e58660-7e8c-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8210ba06627bef1f9a9725c44379752a4a699787 --- /dev/null +++ b/graph/incidents_graphml/d/d3e58660-7e8c-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.17 + 100.64.32.17 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699485381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3e58660-7e8c-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/d/d3ee8b20-1230-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/d/d3ee8b20-1230-11ee-a890-99c329874409.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c55e1c9d5852400e8704d9dcddf9a86d8cafae6f --- /dev/null +++ b/graph/incidents_graphml/d/d3ee8b20-1230-11ee-a890-99c329874409.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.49 + 100.64.39.49 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687571141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3ee8b20-1230-11ee-a890-99c329874409 + + + diff --git a/graph/incidents_graphml/d/d3eeced0-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d3eeced0-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6104d4d1b7473825404602c40b87f4fa0a4dece --- /dev/null +++ b/graph/incidents_graphml/d/d3eeced0-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.212 + 100.64.3.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650107 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d3eeced0-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d3f32e30-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/d/d3f32e30-2efc-11ee-bea9-c5ecb1b621be.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc1c3127053299fbc590a3ecb1e6a5011381ab6e --- /dev/null +++ b/graph/incidents_graphml/d/d3f32e30-2efc-11ee-bea9-c5ecb1b621be.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.232 + 100.64.81.232 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690737391 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3f32e30-2efc-11ee-bea9-c5ecb1b621be + + + diff --git a/graph/incidents_graphml/d/d3f663d0-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d3f663d0-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29d68eafa1434569bd0b8452378c7388b37fbdbb --- /dev/null +++ b/graph/incidents_graphml/d/d3f663d0-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.109 + 100.64.10.109 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d3f663d0-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d3f91570-cb9b-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/d/d3f91570-cb9b-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4d3f01cee94203a3a07ed98a16886cfe79be20f --- /dev/null +++ b/graph/incidents_graphml/d/d3f91570-cb9b-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.142 + 100.64.13.142 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3f91570-cb9b-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/d/d3f93580-0627-11ee-9c9b-212b090473a0.graphml b/graph/incidents_graphml/d/d3f93580-0627-11ee-9c9b-212b090473a0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..883b7d77af495dc92b29b3ff2bfaae5d850cb9cb --- /dev/null +++ b/graph/incidents_graphml/d/d3f93580-0627-11ee-9c9b-212b090473a0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.217 + USER-0015-1402.example.internal + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686247862 + malicious + 0.7525 + 0.7525 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d3f93580-0627-11ee-9c9b-212b090473a0 + + + diff --git a/graph/incidents_graphml/d/d3fadcc0-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d3fadcc0-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a41f094a02cb7ee06c4ad189808f6326e34a0656 --- /dev/null +++ b/graph/incidents_graphml/d/d3fadcc0-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.217 + 100.64.15.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650107 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3fadcc0-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d3fdd8d0-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d3fdd8d0-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6da8a8bbee3213944e51d020aa5977978903ad5f --- /dev/null +++ b/graph/incidents_graphml/d/d3fdd8d0-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.51 + 100.64.17.51 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d3fdd8d0-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d4079460-cb9b-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/d/d4079460-cb9b-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c86e0b64b485ed669ee881f3c6eda70dd524055 --- /dev/null +++ b/graph/incidents_graphml/d/d4079460-cb9b-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.142 + 100.64.13.142 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707958063 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4079460-cb9b-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/d/d4089860-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d4089860-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d43bbb0377835c3fa397d89e056921d60f73a488 --- /dev/null +++ b/graph/incidents_graphml/d/d4089860-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.217 + 100.64.15.217 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650107 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4089860-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d40b1f40-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d40b1f40-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7cfba6994fff8a3e9efe8fddfcfa2d24d8cbc55 --- /dev/null +++ b/graph/incidents_graphml/d/d40b1f40-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.51 + 100.64.17.51 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962289 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d40b1f40-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d40bdca0-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d40bdca0-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52d3219365b821841daf8a65d0b5a282cc3df0c1 --- /dev/null +++ b/graph/incidents_graphml/d/d40bdca0-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.181 + 100.64.23.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974342 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d40bdca0-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d40c4320-a9cc-11ee-9a00-5b0bfffd4a52.graphml b/graph/incidents_graphml/d/d40c4320-a9cc-11ee-9a00-5b0bfffd4a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79aa8bcab37c172ccfda173b958c1522861266c0 --- /dev/null +++ b/graph/incidents_graphml/d/d40c4320-a9cc-11ee-9a00-5b0bfffd4a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.93 + 100.64.58.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704240769 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d40c4320-a9cc-11ee-9a00-5b0bfffd4a52 + + + diff --git a/graph/incidents_graphml/d/d40c5cd0-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d40c5cd0-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9aae58aca85cb86cce2273f5c0d310ffadc40ba9 --- /dev/null +++ b/graph/incidents_graphml/d/d40c5cd0-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.109 + 100.64.10.109 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d40c5cd0-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d40e6f30-1230-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/d/d40e6f30-1230-11ee-a890-99c329874409.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8912aed6b0b008edb5f676d634b92ba66669a4d --- /dev/null +++ b/graph/incidents_graphml/d/d40e6f30-1230-11ee-a890-99c329874409.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.49 + 100.64.39.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687571142 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d40e6f30-1230-11ee-a890-99c329874409 + + + diff --git a/graph/incidents_graphml/d/d41bd380-a9cc-11ee-9a00-5b0bfffd4a52.graphml b/graph/incidents_graphml/d/d41bd380-a9cc-11ee-9a00-5b0bfffd4a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63e5e1c0be01cb73b092d35e15e8b36af46c7787 --- /dev/null +++ b/graph/incidents_graphml/d/d41bd380-a9cc-11ee-9a00-5b0bfffd4a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.93 + 100.64.58.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704240769 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d41bd380-a9cc-11ee-9a00-5b0bfffd4a52 + + + diff --git a/graph/incidents_graphml/d/d41c7420-ee46-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/d/d41c7420-ee46-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..401a80ff9be4cbd7906a989272443380fc50bd9b --- /dev/null +++ b/graph/incidents_graphml/d/d41c7420-ee46-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.46 + 100.64.13.46 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711769846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d41c7420-ee46-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/d/d41d31d0-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d41d31d0-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1150723484c172a5661f6d8f651a8bb2a6eb44c8 --- /dev/null +++ b/graph/incidents_graphml/d/d41d31d0-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.219 + 100.64.15.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650107 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d41d31d0-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d4221ce0-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/d4221ce0-fe69-11ed-a136-877286d930e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2106f5d65249acf9e13a54f6aa2e3150ffb2ca8a --- /dev/null +++ b/graph/incidents_graphml/d/d4221ce0-fe69-11ed-a136-877286d930e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.99 + 100.64.7.99 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685396600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4221ce0-fe69-11ed-a136-877286d930e4 + + + diff --git a/graph/incidents_graphml/d/d428acd0-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d428acd0-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f34233f5e5d294122eb0b3cbbc8b5e40bf318cb5 --- /dev/null +++ b/graph/incidents_graphml/d/d428acd0-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.55 + 100.64.23.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944776 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d428acd0-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d429dc00-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d429dc00-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd2e3d7de9ef6826452b9f4515263c50c213eae8 --- /dev/null +++ b/graph/incidents_graphml/d/d429dc00-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.220 + 100.64.15.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650107 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d429dc00-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d42adbb0-32a3-11ed-8733-159f58feb2ea.graphml b/graph/incidents_graphml/d/d42adbb0-32a3-11ed-8733-159f58feb2ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..341d4baf1d57d197d930b97ab5240c490a157185 --- /dev/null +++ b/graph/incidents_graphml/d/d42adbb0-32a3-11ed-8733-159f58feb2ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.18.72 + 100.64.18.72 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662991473 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d42adbb0-32a3-11ed-8733-159f58feb2ea + + + diff --git a/graph/incidents_graphml/d/d42be800-dfa1-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/d/d42be800-dfa1-11ee-9120-ff7b7094ac3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85203d461b2f4f1d071998378382308032365b87 --- /dev/null +++ b/graph/incidents_graphml/d/d42be800-dfa1-11ee-9120-ff7b7094ac3d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.126 + 100.64.39.126 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.37.23 + 100.64.37.23 + ["Exploiting Target","Exploiting Host"] + 0.9325 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710159663 + malicious + 0.9325 + 0.9325 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d42be800-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159663 + malicious + 0.9325 + 0.9325 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d42be800-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159663 + malicious + 0.9325 + 0.9325 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d42be800-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159663 + malicious + 0.9325 + 0.9325 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d42be800-dfa1-11ee-9120-ff7b7094ac3d + + + diff --git a/graph/incidents_graphml/d/d432bb90-3f8c-11ee-9b72-817daf89a87d.graphml b/graph/incidents_graphml/d/d432bb90-3f8c-11ee-9b72-817daf89a87d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b5fa188920ae6388010282d5d3dd0b9b896c016 --- /dev/null +++ b/graph/incidents_graphml/d/d432bb90-3f8c-11ee-9b72-817daf89a87d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.14 + 100.64.23.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692558458 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d432bb90-3f8c-11ee-9b72-817daf89a87d + + + diff --git a/graph/incidents_graphml/d/d4380cd0-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d4380cd0-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ee51a6ddab3bd3e0cea2d868ae2b3dd2e0eb4fc --- /dev/null +++ b/graph/incidents_graphml/d/d4380cd0-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.220 + 100.64.15.220 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650107 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4380cd0-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d43d4600-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/d43d4600-fe69-11ed-a136-877286d930e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f8b77662adc2ad7b13401ec3d1e21aa046def47 --- /dev/null +++ b/graph/incidents_graphml/d/d43d4600-fe69-11ed-a136-877286d930e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.99 + 100.64.7.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685396600 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d43d4600-fe69-11ed-a136-877286d930e4 + + + diff --git a/graph/incidents_graphml/d/d43d6a70-0627-11ee-9c9b-212b090473a0.graphml b/graph/incidents_graphml/d/d43d6a70-0627-11ee-9c9b-212b090473a0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adc8412bde1de4290bf40733f020803917035ced --- /dev/null +++ b/graph/incidents_graphml/d/d43d6a70-0627-11ee-9c9b-212b090473a0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.143 + 100.64.18.143 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686247863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d43d6a70-0627-11ee-9c9b-212b090473a0 + + + diff --git a/graph/incidents_graphml/d/d43d73f0-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d43d73f0-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adc08f0b71da69082fe79dc260670f8d22e918cb --- /dev/null +++ b/graph/incidents_graphml/d/d43d73f0-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974343 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d43d73f0-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d43e8b50-9513-11ee-a8c1-31ddf83b0c64.graphml b/graph/incidents_graphml/d/d43e8b50-9513-11ee-a8c1-31ddf83b0c64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8716d8044c57abef58daa6b606e80f46af8d27c --- /dev/null +++ b/graph/incidents_graphml/d/d43e8b50-9513-11ee-a8c1-31ddf83b0c64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.53 + 100.64.17.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701962289 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d43e8b50-9513-11ee-a8c1-31ddf83b0c64 + + + diff --git a/graph/incidents_graphml/d/d43fb390-ee46-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/d/d43fb390-ee46-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..443a5074782e1fff529d0559071ac9b9b81cc5ac --- /dev/null +++ b/graph/incidents_graphml/d/d43fb390-ee46-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.180 + 100.64.51.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711769847 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d43fb390-ee46-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/d/d4420130-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d4420130-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbeeec00cf4a6fa8bd4a9732111b10a9d2781458 --- /dev/null +++ b/graph/incidents_graphml/d/d4420130-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.55 + 100.64.23.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944776 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4420130-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d44560b0-cb9b-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/d/d44560b0-cb9b-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8b6e295714c184f255d6833f5812f2233579faf --- /dev/null +++ b/graph/incidents_graphml/d/d44560b0-cb9b-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.144 + 100.64.13.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d44560b0-cb9b-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/d/d44b4020-0e09-11ee-8450-3d12cf9a9e06.graphml b/graph/incidents_graphml/d/d44b4020-0e09-11ee-8450-3d12cf9a9e06.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ada9e3668aa89fa42b205890c10ce8295e34c36 --- /dev/null +++ b/graph/incidents_graphml/d/d44b4020-0e09-11ee-8450-3d12cf9a9e06.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.245 + 100.64.53.245 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687114587 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d44b4020-0e09-11ee-8450-3d12cf9a9e06 + + + diff --git a/graph/incidents_graphml/d/d44b4370-3877-11ee-b68a-37ae93e84217.graphml b/graph/incidents_graphml/d/d44b4370-3877-11ee-b68a-37ae93e84217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62598f9ceb7627aa2fe29f179c04ba5794a25444 --- /dev/null +++ b/graph/incidents_graphml/d/d44b4370-3877-11ee-b68a-37ae93e84217.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.60 + 100.64.66.60 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691779781 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d44b4370-3877-11ee-b68a-37ae93e84217 + + + diff --git a/graph/incidents_graphml/d/d4500af0-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d4500af0-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..464d50493de424c58d5ae77aa30c272c419ee2c3 --- /dev/null +++ b/graph/incidents_graphml/d/d4500af0-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.57 + 100.64.23.57 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4500af0-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d4536a70-cb9b-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/d/d4536a70-cb9b-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ab4a2f4ef34f5dc314dec61b462dd8c1e1445d5 --- /dev/null +++ b/graph/incidents_graphml/d/d4536a70-cb9b-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.144 + 100.64.13.144 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707958063 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4536a70-cb9b-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/d/d455fe20-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/d455fe20-fe69-11ed-a136-877286d930e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce15ab76b72e5720d312b5fd3cd836e1ebd0ca5f --- /dev/null +++ b/graph/incidents_graphml/d/d455fe20-fe69-11ed-a136-877286d930e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.101 + 100.64.7.101 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685396600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d455fe20-fe69-11ed-a136-877286d930e4 + + + diff --git a/graph/incidents_graphml/d/d457a2c0-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d457a2c0-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..352119867e0c66c1bcbee88400a6d81491b199fe --- /dev/null +++ b/graph/incidents_graphml/d/d457a2c0-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.164 + 100.64.9.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650107 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d457a2c0-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d45f7440-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d45f7440-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9786096dc66954d562381f032085fa536dea4503 --- /dev/null +++ b/graph/incidents_graphml/d/d45f7440-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.57 + 100.64.23.57 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944777 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d45f7440-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d45fc680-cb9b-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/d/d45fc680-cb9b-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb22eecd77f667e09eb6f2c081267cc2e88c8d2b --- /dev/null +++ b/graph/incidents_graphml/d/d45fc680-cb9b-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,505 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.146 + 100.64.13.146 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.147 + 100.64.13.147 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.148 + 100.64.13.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.254 + 100.64.7.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.123 + 100.64.8.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.149 + 100.64.13.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.150 + 100.64.13.150 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.151 + 100.64.13.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.152 + 100.64.13.152 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d45fc680-cb9b-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/d/d463ed10-32a3-11ed-8733-159f58feb2ea.graphml b/graph/incidents_graphml/d/d463ed10-32a3-11ed-8733-159f58feb2ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e14d531c1254c5417d831d61133a3234058cee2a --- /dev/null +++ b/graph/incidents_graphml/d/d463ed10-32a3-11ed-8733-159f58feb2ea.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.148 + 100.64.84.148 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662991474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d463ed10-32a3-11ed-8733-159f58feb2ea + + + INCIDENT_LINK + 1662991474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d463ed10-32a3-11ed-8733-159f58feb2ea + + + diff --git a/graph/incidents_graphml/d/d466bdf0-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d466bdf0-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07203793b324d87ddbe9aec5d2f6500fd6ed4518 --- /dev/null +++ b/graph/incidents_graphml/d/d466bdf0-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.164 + 100.64.9.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650107 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d466bdf0-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d4689670-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/d/d4689670-138b-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce2f059bfbd09dbe3f148d9e53ad67c762787b16 --- /dev/null +++ b/graph/incidents_graphml/d/d4689670-138b-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.219 + 100.64.70.219 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.228 + 100.64.71.228 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687720178 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4689670-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720178 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4689670-138b-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/d/d46ad080-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d46ad080-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5de8f03e5ea819585963a190a0258185a5a9aab --- /dev/null +++ b/graph/incidents_graphml/d/d46ad080-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.111 + 100.64.10.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338293 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d46ad080-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d46d9880-3877-11ee-b68a-37ae93e84217.graphml b/graph/incidents_graphml/d/d46d9880-3877-11ee-b68a-37ae93e84217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e12f4bfc4efe4fb6c5d5d155ebb6996409a4c202 --- /dev/null +++ b/graph/incidents_graphml/d/d46d9880-3877-11ee-b68a-37ae93e84217.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.60 + 100.64.66.60 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691779781 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d46d9880-3877-11ee-b68a-37ae93e84217 + + + diff --git a/graph/incidents_graphml/d/d46ddbf0-0983-11ef-a068-8dbaaaaf6c28.graphml b/graph/incidents_graphml/d/d46ddbf0-0983-11ef-a068-8dbaaaaf6c28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55fd5575dd3b537e1d5ddc7296fd05bba3a9e40f --- /dev/null +++ b/graph/incidents_graphml/d/d46ddbf0-0983-11ef-a068-8dbaaaaf6c28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.119 + 100.64.62.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714764728 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d46ddbf0-0983-11ef-a068-8dbaaaaf6c28 + + + diff --git a/graph/incidents_graphml/d/d46f7990-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/d46f7990-fe69-11ed-a136-877286d930e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e22c255717b4bdab8f174ed99b78ae74a6a35920 --- /dev/null +++ b/graph/incidents_graphml/d/d46f7990-fe69-11ed-a136-877286d930e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.101 + 100.64.7.101 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685396600 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d46f7990-fe69-11ed-a136-877286d930e4 + + + diff --git a/graph/incidents_graphml/d/d476d4b0-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/d/d476d4b0-a4a5-11ed-b478-67badd244434.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66f280e50e68079f8108f2d6237766d7423f5619 --- /dev/null +++ b/graph/incidents_graphml/d/d476d4b0-a4a5-11ed-b478-67badd244434.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.156 + 100.64.72.156 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.82.153 + 100.64.82.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1675526765 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d476d4b0-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526765 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d476d4b0-a4a5-11ed-b478-67badd244434 + + + diff --git a/graph/incidents_graphml/d/d47a60e0-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d47a60e0-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b944483bdea793176b2fe6d277723d4c34c0ff04 --- /dev/null +++ b/graph/incidents_graphml/d/d47a60e0-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.111 + 100.64.10.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338293 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d47a60e0-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d47d6c50-0983-11ef-a068-8dbaaaaf6c28.graphml b/graph/incidents_graphml/d/d47d6c50-0983-11ef-a068-8dbaaaaf6c28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bad6bed488b74aad074ed1fd4626a93a2f5c356b --- /dev/null +++ b/graph/incidents_graphml/d/d47d6c50-0983-11ef-a068-8dbaaaaf6c28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.119 + 100.64.62.119 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714764728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d47d6c50-0983-11ef-a068-8dbaaaaf6c28 + + + diff --git a/graph/incidents_graphml/d/d4815ca0-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d4815ca0-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05e422f44b583f669e115d0c93da987fb91b855e --- /dev/null +++ b/graph/incidents_graphml/d/d4815ca0-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.213 + 100.64.27.213 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770401 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4815ca0-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d485e520-0627-11ee-9c9b-212b090473a0.graphml b/graph/incidents_graphml/d/d485e520-0627-11ee-9c9b-212b090473a0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6ac597ff710726b2263a017d35dac097de785b2 --- /dev/null +++ b/graph/incidents_graphml/d/d485e520-0627-11ee-9c9b-212b090473a0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.74 + 100.64.18.74 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686247863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d485e520-0627-11ee-9c9b-212b090473a0 + + + diff --git a/graph/incidents_graphml/d/d4869b70-0e09-11ee-8450-3d12cf9a9e06.graphml b/graph/incidents_graphml/d/d4869b70-0e09-11ee-8450-3d12cf9a9e06.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58fe4a146aff63258d82a1cea19c9b6c9bb899a3 --- /dev/null +++ b/graph/incidents_graphml/d/d4869b70-0e09-11ee-8450-3d12cf9a9e06.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.247 + USER-0015-1403.example.internal + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687114587 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4869b70-0e09-11ee-8450-3d12cf9a9e06 + + + diff --git a/graph/incidents_graphml/d/d486d220-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/d486d220-fe69-11ed-a136-877286d930e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4817b5e3c14f615af5085d1be451c2bd3e04b59b --- /dev/null +++ b/graph/incidents_graphml/d/d486d220-fe69-11ed-a136-877286d930e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.103 + 100.64.7.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685396601 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d486d220-fe69-11ed-a136-877286d930e4 + + + diff --git a/graph/incidents_graphml/d/d48b50d0-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d48b50d0-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f9082066ddc5c068cd4c6763b51388d3b12c8fb --- /dev/null +++ b/graph/incidents_graphml/d/d48b50d0-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.113 + 100.64.10.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338293 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d48b50d0-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/d/d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff6cc7d376c7f294de6c3f9b245377e7c15e8fdc --- /dev/null +++ b/graph/incidents_graphml/d/d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.34 + 100.64.19.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.35 + 100.64.19.35 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.36 + 100.64.19.36 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.37 + 100.64.19.37 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.179 + 100.64.12.179 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.38 + 100.64.19.38 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.39 + 100.64.19.39 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.40 + 100.64.19.40 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.41 + 100.64.19.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.42 + 100.64.19.42 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.43 + 100.64.19.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.44 + 100.64.19.44 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.45 + 100.64.19.45 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.46 + 100.64.19.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.25 + 100.64.8.25 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.47 + 100.64.19.47 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.48 + 100.64.19.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.49 + 100.64.19.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.50 + 100.64.19.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.51 + 100.64.19.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d48d9090-5eab-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/d/d49029b0-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d49029b0-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..284b5571aa75be2f3d213e7050e73bf4e10d2055 --- /dev/null +++ b/graph/incidents_graphml/d/d49029b0-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.213 + 100.64.27.213 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770401 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d49029b0-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d49410c0-a9cc-11ee-9a00-5b0bfffd4a52.graphml b/graph/incidents_graphml/d/d49410c0-a9cc-11ee-9a00-5b0bfffd4a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b43e8e9bcb0e7635e0f98e894d2730198d6c1e68 --- /dev/null +++ b/graph/incidents_graphml/d/d49410c0-a9cc-11ee-9a00-5b0bfffd4a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.95 + 100.64.58.95 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704240770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d49410c0-a9cc-11ee-9a00-5b0bfffd4a52 + + + diff --git a/graph/incidents_graphml/d/d495e930-ab03-11ee-b232-53d7d9eb2146.graphml b/graph/incidents_graphml/d/d495e930-ab03-11ee-b232-53d7d9eb2146.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e6f1e23cc0aeb909a6b2efb5341a0e9c9b34683 --- /dev/null +++ b/graph/incidents_graphml/d/d495e930-ab03-11ee-b232-53d7d9eb2146.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704374343 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d495e930-ab03-11ee-b232-53d7d9eb2146 + + + diff --git a/graph/incidents_graphml/d/d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/d/d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..735ce24f747a699ecd40180d10b4219a0fd73835 --- /dev/null +++ b/graph/incidents_graphml/d/d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.70 + 100.64.19.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.71 + 100.64.19.71 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.72 + 100.64.19.72 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.73 + 100.64.19.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.96.216.116 + 10.96.216.116 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.78.43 + 172.27.78.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.74 + 100.64.19.74 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.75 + 100.64.19.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.76 + 100.64.19.76 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.208 + 100.64.11.208 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.77 + 100.64.19.77 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.78 + 100.64.19.78 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.79 + 100.64.19.79 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.80 + 100.64.19.80 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.81 + 100.64.19.81 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.82 + 100.64.19.82 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.91 + 100.64.10.91 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.83 + USER-0015-1218.example.internal + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.84 + 100.64.19.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980259 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d49afe10-5eab-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/d/d49e1b10-0e09-11ee-8450-3d12cf9a9e06.graphml b/graph/incidents_graphml/d/d49e1b10-0e09-11ee-8450-3d12cf9a9e06.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e788998be9ab478569b77f9534ea8fecb7520515 --- /dev/null +++ b/graph/incidents_graphml/d/d49e1b10-0e09-11ee-8450-3d12cf9a9e06.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.249 + 100.64.53.249 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687114588 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d49e1b10-0e09-11ee-8450-3d12cf9a9e06 + + + diff --git a/graph/incidents_graphml/d/d4a08e00-5cd7-11ee-9b5e-8914f9a5338d.graphml b/graph/incidents_graphml/d/d4a08e00-5cd7-11ee-9b5e-8914f9a5338d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa79ad8497e25915af8f06561417a8c3160e30b4 --- /dev/null +++ b/graph/incidents_graphml/d/d4a08e00-5cd7-11ee-9b5e-8914f9a5338d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.190.96.179 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.6.202 + USER-0015-2056.example.internal + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695779255 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4a08e00-5cd7-11ee-9b5e-8914f9a5338d + + + diff --git a/graph/incidents_graphml/d/d4a35ad0-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/d4a35ad0-fe69-11ed-a136-877286d930e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56dfcda9378f6eaecbeef43a6f1f40139d51c947 --- /dev/null +++ b/graph/incidents_graphml/d/d4a35ad0-fe69-11ed-a136-877286d930e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.103 + 100.64.7.103 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685396601 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4a35ad0-fe69-11ed-a136-877286d930e4 + + + diff --git a/graph/incidents_graphml/d/d4a3ef40-a9cc-11ee-9a00-5b0bfffd4a52.graphml b/graph/incidents_graphml/d/d4a3ef40-a9cc-11ee-9a00-5b0bfffd4a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f2a59826b5031ddcc993021b500e51283626eb8 --- /dev/null +++ b/graph/incidents_graphml/d/d4a3ef40-a9cc-11ee-9a00-5b0bfffd4a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.95 + 100.64.58.95 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704240770 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4a3ef40-a9cc-11ee-9a00-5b0bfffd4a52 + + + diff --git a/graph/incidents_graphml/d/d4a3f470-0627-11ee-9c9b-212b090473a0.graphml b/graph/incidents_graphml/d/d4a3f470-0627-11ee-9c9b-212b090473a0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb7b10cc321419dc38b7edf1bf7ea342417a3b73 --- /dev/null +++ b/graph/incidents_graphml/d/d4a3f470-0627-11ee-9c9b-212b090473a0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.74 + 100.64.18.74 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686247863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4a3f470-0627-11ee-9c9b-212b090473a0 + + + diff --git a/graph/incidents_graphml/d/d4a52b70-ab03-11ee-b232-53d7d9eb2146.graphml b/graph/incidents_graphml/d/d4a52b70-ab03-11ee-b232-53d7d9eb2146.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b740d4369e51894e00fc39f93514fd9409ea34e4 --- /dev/null +++ b/graph/incidents_graphml/d/d4a52b70-ab03-11ee-b232-53d7d9eb2146.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Target","Exploiting Host"] + 0.983125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704374343 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4a52b70-ab03-11ee-b232-53d7d9eb2146 + + + diff --git a/graph/incidents_graphml/d/d4a900e0-212b-11ee-be86-791271b8260d.graphml b/graph/incidents_graphml/d/d4a900e0-212b-11ee-be86-791271b8260d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ded0e40921c9643e0ca30cf764b53af9f97b6ee --- /dev/null +++ b/graph/incidents_graphml/d/d4a900e0-212b-11ee-be86-791271b8260d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.121 + 100.64.10.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689218263 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4a900e0-212b-11ee-be86-791271b8260d + + + diff --git a/graph/incidents_graphml/d/d4aa0c00-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/d/d4aa0c00-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d704968cfb72055de1984afb7d7ba94b5864d1ae --- /dev/null +++ b/graph/incidents_graphml/d/d4aa0c00-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.138 + 100.64.95.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673829824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4aa0c00-9536-11ed-b287-e7a585a77071 + + + INCIDENT_LINK + 1673829824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4aa0c00-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/d/d4ade680-cb9b-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/d/d4ade680-cb9b-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a8cca74030811086a22a4e78e773839a8b11d18 --- /dev/null +++ b/graph/incidents_graphml/d/d4ade680-cb9b-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.160 + 100.64.13.160 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707958064 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4ade680-cb9b-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707958064 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4ade680-cb9b-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/d/d4ae03a0-9536-11ed-b287-e7a585a77071.graphml b/graph/incidents_graphml/d/d4ae03a0-9536-11ed-b287-e7a585a77071.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7df5becc46a93042c287cda617d61d9b7c65f381 --- /dev/null +++ b/graph/incidents_graphml/d/d4ae03a0-9536-11ed-b287-e7a585a77071.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.138 + 100.64.95.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673829824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d4ae03a0-9536-11ed-b287-e7a585a77071 + + + diff --git a/graph/incidents_graphml/d/d4b3f880-ab03-11ee-b232-53d7d9eb2146.graphml b/graph/incidents_graphml/d/d4b3f880-ab03-11ee-b232-53d7d9eb2146.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c7b0facf47d5c62ea8f535b1abb553e03970109 --- /dev/null +++ b/graph/incidents_graphml/d/d4b3f880-ab03-11ee-b232-53d7d9eb2146.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.65 + 100.64.48.65 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704374343 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4b3f880-ab03-11ee-b232-53d7d9eb2146 + + + diff --git a/graph/incidents_graphml/d/d4bbbb40-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/d4bbbb40-9562-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ac5935259819a7efe4a91486fc2f9a2c62ace5e --- /dev/null +++ b/graph/incidents_graphml/d/d4bbbb40-9562-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.161 + 100.64.78.161 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.16.187 + 100.64.16.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1673848722 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4bbbb40-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848722 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4bbbb40-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848722 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4bbbb40-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848722 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4bbbb40-9562-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/d/d4bdec10-cb9b-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/d/d4bdec10-cb9b-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b8066d873a3fbcc97a14a0f65dd560d880fa286 --- /dev/null +++ b/graph/incidents_graphml/d/d4bdec10-cb9b-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.160 + 100.64.13.160 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707958064 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4bdec10-cb9b-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/d/d4c313b0-ab03-11ee-b232-53d7d9eb2146.graphml b/graph/incidents_graphml/d/d4c313b0-ab03-11ee-b232-53d7d9eb2146.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2eefb4ea3aebf042c2b7fa6b0b28d2e6d57baae --- /dev/null +++ b/graph/incidents_graphml/d/d4c313b0-ab03-11ee-b232-53d7d9eb2146.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.65 + 100.64.48.65 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704374343 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4c313b0-ab03-11ee-b232-53d7d9eb2146 + + + diff --git a/graph/incidents_graphml/d/d4c64980-0627-11ee-9c9b-212b090473a0.graphml b/graph/incidents_graphml/d/d4c64980-0627-11ee-9c9b-212b090473a0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fa09739ff00ab8c03870d644e72764190c06228 --- /dev/null +++ b/graph/incidents_graphml/d/d4c64980-0627-11ee-9c9b-212b090473a0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.222 + 100.64.13.222 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686247863 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4c64980-0627-11ee-9c9b-212b090473a0 + + + diff --git a/graph/incidents_graphml/d/d4c92340-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d4c92340-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5fdce4aa9c084a5547f4bcf89e5d93740fc7c55 --- /dev/null +++ b/graph/incidents_graphml/d/d4c92340-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.113 + 100.64.56.113 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4c92340-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d4cb03f0-3f8c-11ee-9b72-817daf89a87d.graphml b/graph/incidents_graphml/d/d4cb03f0-3f8c-11ee-9b72-817daf89a87d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbb84a06160a676dc08c014a1fa3ae3a514bbc98 --- /dev/null +++ b/graph/incidents_graphml/d/d4cb03f0-3f8c-11ee-9b72-817daf89a87d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.16 + 100.64.23.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692558459 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4cb03f0-3f8c-11ee-9b72-817daf89a87d + + + diff --git a/graph/incidents_graphml/d/d4d16b90-ab03-11ee-b232-53d7d9eb2146.graphml b/graph/incidents_graphml/d/d4d16b90-ab03-11ee-b232-53d7d9eb2146.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a26c2a5a9a4059ebe57ed00c71f8a29aa4e76250 --- /dev/null +++ b/graph/incidents_graphml/d/d4d16b90-ab03-11ee-b232-53d7d9eb2146.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704374343 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4d16b90-ab03-11ee-b232-53d7d9eb2146 + + + diff --git a/graph/incidents_graphml/d/d4d50990-0e09-11ee-8450-3d12cf9a9e06.graphml b/graph/incidents_graphml/d/d4d50990-0e09-11ee-8450-3d12cf9a9e06.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b15add3480e7259aad3f0d31ada09a46ead3f5ce --- /dev/null +++ b/graph/incidents_graphml/d/d4d50990-0e09-11ee-8450-3d12cf9a9e06.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.205 + 100.64.50.205 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687114588 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4d50990-0e09-11ee-8450-3d12cf9a9e06 + + + diff --git a/graph/incidents_graphml/d/d4d86f50-a061-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/d/d4d86f50-a061-11ee-9181-41cbe26a7b16.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92fc458d8082345af8e45cac9f85c246c2f4cd66 --- /dev/null +++ b/graph/incidents_graphml/d/d4d86f50-a061-11ee-9181-41cbe26a7b16.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.154 + 100.64.29.154 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1703205253 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4d86f50-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205253 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4d86f50-a061-11ee-9181-41cbe26a7b16 + + + diff --git a/graph/incidents_graphml/d/d4dcf340-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d4dcf340-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44ab766c42c1067bf80641b5328e39fe42386617 --- /dev/null +++ b/graph/incidents_graphml/d/d4dcf340-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.115 + 100.64.10.115 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338293 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4dcf340-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d4e086c0-ab03-11ee-b232-53d7d9eb2146.graphml b/graph/incidents_graphml/d/d4e086c0-ab03-11ee-b232-53d7d9eb2146.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c9b1614871cd34c9aad3c73f4aa9426910dcd54 --- /dev/null +++ b/graph/incidents_graphml/d/d4e086c0-ab03-11ee-b232-53d7d9eb2146.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704374344 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4e086c0-ab03-11ee-b232-53d7d9eb2146 + + + diff --git a/graph/incidents_graphml/d/d4e40ab0-0627-11ee-9c9b-212b090473a0.graphml b/graph/incidents_graphml/d/d4e40ab0-0627-11ee-9c9b-212b090473a0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfbd7cc75b0c64ab33401461b89b5455240e2eba --- /dev/null +++ b/graph/incidents_graphml/d/d4e40ab0-0627-11ee-9c9b-212b090473a0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.222 + 100.64.13.222 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686247864 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4e40ab0-0627-11ee-9c9b-212b090473a0 + + + diff --git a/graph/incidents_graphml/d/d4ec83a0-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d4ec83a0-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ce22ec56831e40b8e360c471708bdc9a050120a --- /dev/null +++ b/graph/incidents_graphml/d/d4ec83a0-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.115 + 100.64.10.115 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338294 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4ec83a0-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d4ec9fb0-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d4ec9fb0-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1528d4aad74f0dfd06d03fedcc9070e4cb907a58 --- /dev/null +++ b/graph/incidents_graphml/d/d4ec9fb0-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.183 + 100.64.23.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974344 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4ec9fb0-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d4f297d0-0823-11ee-af5c-6f7331aea810.graphml b/graph/incidents_graphml/d/d4f297d0-0823-11ee-af5c-6f7331aea810.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e2096a16f62f0ba17eac4ff75a049654038c1bb --- /dev/null +++ b/graph/incidents_graphml/d/d4f297d0-0823-11ee-af5c-6f7331aea810.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.190 + 100.64.7.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686466048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d4f297d0-0823-11ee-af5c-6f7331aea810 + + + diff --git a/graph/incidents_graphml/d/d4f34b70-ab03-11ee-b232-53d7d9eb2146.graphml b/graph/incidents_graphml/d/d4f34b70-ab03-11ee-b232-53d7d9eb2146.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d7eff83775667ddc96cc3483a2b0236d5df73ab --- /dev/null +++ b/graph/incidents_graphml/d/d4f34b70-ab03-11ee-b232-53d7d9eb2146.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.143 + 100.64.26.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704374344 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4f34b70-ab03-11ee-b232-53d7d9eb2146 + + + diff --git a/graph/incidents_graphml/d/d4f66ec0-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d4f66ec0-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8206e2236309b6ab9a644555e4741f5b50e4874 --- /dev/null +++ b/graph/incidents_graphml/d/d4f66ec0-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.118 + 100.64.52.118 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790983 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d4f66ec0-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d4fcd750-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d4fcd750-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd6baf689d69962dad2afbc37f20008ac476fa27 --- /dev/null +++ b/graph/incidents_graphml/d/d4fcd750-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338294 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d4fcd750-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d5098180-4fbc-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/d/d5098180-4fbc-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7cc83d1c47203225a77d1ceb862026498ad69a4 --- /dev/null +++ b/graph/incidents_graphml/d/d5098180-4fbc-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.119 + 100.64.10.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694338294 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5098180-4fbc-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/d/d50b8e60-ab03-11ee-b232-53d7d9eb2146.graphml b/graph/incidents_graphml/d/d50b8e60-ab03-11ee-b232-53d7d9eb2146.graphml new file mode 100644 index 0000000000000000000000000000000000000000..047a2b4e48d550e4604ae47ce583937fe10868d6 --- /dev/null +++ b/graph/incidents_graphml/d/d50b8e60-ab03-11ee-b232-53d7d9eb2146.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704374344 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d50b8e60-ab03-11ee-b232-53d7d9eb2146 + + + diff --git a/graph/incidents_graphml/d/d50ba470-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d50ba470-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc3388c0ad4a361a0912fa5124c4ccc61d261a80 --- /dev/null +++ b/graph/incidents_graphml/d/d50ba470-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.118 + 100.64.52.118 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790983 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d50ba470-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d51f2c70-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d51f2c70-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..814cfdf8cc1ec721081b8a1f4eb21232c86f2df1 --- /dev/null +++ b/graph/incidents_graphml/d/d51f2c70-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.120 + 100.64.52.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d51f2c70-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d520eb20-ab03-11ee-b232-53d7d9eb2146.graphml b/graph/incidents_graphml/d/d520eb20-ab03-11ee-b232-53d7d9eb2146.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6326e1f3bc3f13476a058115b857261836b9f97c --- /dev/null +++ b/graph/incidents_graphml/d/d520eb20-ab03-11ee-b232-53d7d9eb2146.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704374344 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d520eb20-ab03-11ee-b232-53d7d9eb2146 + + + diff --git a/graph/incidents_graphml/d/d527f460-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d527f460-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbd15bf91bd7fd668aff0248cb8d5fe7a4277e6b --- /dev/null +++ b/graph/incidents_graphml/d/d527f460-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,713 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.59 + 100.64.23.59 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d527f460-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d52d0370-06f3-11ed-aa49-fd880ad1c649.graphml b/graph/incidents_graphml/d/d52d0370-06f3-11ed-aa49-fd880ad1c649.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c233c03c739c7db4a46ed6e82443d8fb205217a9 --- /dev/null +++ b/graph/incidents_graphml/d/d52d0370-06f3-11ed-aa49-fd880ad1c649.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.43 + USER-0015-1628.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658187984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d52d0370-06f3-11ed-aa49-fd880ad1c649 + + + diff --git a/graph/incidents_graphml/d/d52e2090-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d52e2090-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9606f16c3d6b767a2923ee37c56af2380a321d57 --- /dev/null +++ b/graph/incidents_graphml/d/d52e2090-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.120 + 100.64.52.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790984 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d52e2090-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d5315740-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/d/d5315740-085f-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfdb187f43088bfe519611f5e16d65b11a527be5 --- /dev/null +++ b/graph/incidents_graphml/d/d5315740-085f-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.255 + 100.64.53.255 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686491818 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5315740-085f-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/d/d5393270-7089-11ee-80e3-478cd78f93ad.graphml b/graph/incidents_graphml/d/d5393270-7089-11ee-80e3-478cd78f93ad.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d86ea4b7ed49b00e3b3cc32488aa9f65396f45e2 --- /dev/null +++ b/graph/incidents_graphml/d/d5393270-7089-11ee-80e3-478cd78f93ad.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.59 + 100.64.23.59 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697944778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d5393270-7089-11ee-80e3-478cd78f93ad + + + diff --git a/graph/incidents_graphml/d/d53f49e0-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d53f49e0-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45706d4424abed74bffcd586fc023e6f1c019f2c --- /dev/null +++ b/graph/incidents_graphml/d/d53f49e0-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.70 + 100.64.93.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660999040 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d53f49e0-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d541f6b0-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d541f6b0-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6638e7be6443ae315a66798d936472169fd16a46 --- /dev/null +++ b/graph/incidents_graphml/d/d541f6b0-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.14 + 100.64.35.14 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790984 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d541f6b0-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d5442be0-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d5442be0-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f782d5278a4bde7add84a1f3291cc406ba37084e --- /dev/null +++ b/graph/incidents_graphml/d/d5442be0-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.75 + 100.64.93.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1660999040 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5442be0-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d5499de0-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d5499de0-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbe45131267c8c04a22fdf1dffa99b66ad4509ae --- /dev/null +++ b/graph/incidents_graphml/d/d5499de0-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.115 + HOST-9658 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5499de0-4df2-11ee-b1dc-abeaf7aaf97f + + + INCIDENT_LINK + 1694141585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5499de0-4df2-11ee-b1dc-abeaf7aaf97f + + + INCIDENT_LINK + 1694141585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5499de0-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d54c8060-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/d/d54c8060-085f-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7443348716ca73d13be70b95aa996717f1516a5d --- /dev/null +++ b/graph/incidents_graphml/d/d54c8060-085f-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.255 + 100.64.53.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686491818 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d54c8060-085f-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/d/d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/d/d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e6055f710db20f2761e844081e94cbf0e8eb5ce --- /dev/null +++ b/graph/incidents_graphml/d/d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,691 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.34 + 100.64.18.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.102 + 100.64.19.102 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.103 + 100.64.19.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.104 + 100.64.19.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.105 + 100.64.19.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.106 + 100.64.19.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.127 + 100.64.11.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.107 + 100.64.19.107 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.108 + 100.64.19.108 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.109 + 100.64.19.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.45 + 100.64.19.45 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.110 + 100.64.19.110 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.111 + 100.64.19.111 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.112 + 100.64.19.112 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.113 + 100.64.19.113 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d54dac40-5eab-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/d/d54e8c20-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d54e8c20-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11905e0a7c6fa3af0e738125694cae31e0c3a8d2 --- /dev/null +++ b/graph/incidents_graphml/d/d54e8c20-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.93.75 + 100.64.93.75 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660999040 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d54e8c20-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d55a18a0-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d55a18a0-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..520ac748ec6ebc7d8474e4e09ac754a5f19cee07 --- /dev/null +++ b/graph/incidents_graphml/d/d55a18a0-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.115 + HOST-9658 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d55a18a0-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d55da750-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d55da750-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec1c14432ca2f838da3ef929a32ec687b25c7e30 --- /dev/null +++ b/graph/incidents_graphml/d/d55da750-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.93.76 + 100.64.93.76 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660999040 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d55da750-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d56bd820-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d56bd820-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3f1e3cd715e0cdfbd5fe0d2d32bda5530329b3e --- /dev/null +++ b/graph/incidents_graphml/d/d56bd820-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.77.13 + 100.64.77.13 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660999040 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d56bd820-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d56ef0f0-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d56ef0f0-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d71603621b7438585ba36f1e87ac624f0a16ccb0 --- /dev/null +++ b/graph/incidents_graphml/d/d56ef0f0-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d56ef0f0-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d5717130-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d5717130-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b6b595197ef98541a42a6a42118b83827b828f7 --- /dev/null +++ b/graph/incidents_graphml/d/d5717130-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.115 + HOST-9658 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d5717130-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d5818e90-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d5818e90-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc9ff72ca42a724e0894187b6451d42a827c1f12 --- /dev/null +++ b/graph/incidents_graphml/d/d5818e90-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770403 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d5818e90-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d588d280-ecdf-11ee-ac0b-e5fde63aeb72.graphml b/graph/incidents_graphml/d/d588d280-ecdf-11ee-ac0b-e5fde63aeb72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8d26e7f59173dfbf35e4ff2c002b7f2e5de5933 --- /dev/null +++ b/graph/incidents_graphml/d/d588d280-ecdf-11ee-ac0b-e5fde63aeb72.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.210 + 100.64.68.210 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect"] + + + INCIDENT_LINK + 1711615659 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d588d280-ecdf-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711615659 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d588d280-ecdf-11ee-ac0b-e5fde63aeb72 + + + diff --git a/graph/incidents_graphml/d/d58c7340-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d58c7340-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5843c57200e10b6eb05a724676da9b87717c8cd --- /dev/null +++ b/graph/incidents_graphml/d/d58c7340-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.115 + HOST-9658 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141585 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d58c7340-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d593f090-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/d593f090-8559-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdaf3162d2c3ed1f13c2a332bc73fcc2ff9cfc77 --- /dev/null +++ b/graph/incidents_graphml/d/d593f090-8559-11ee-823e-1956338371c0.graphml @@ -0,0 +1,489 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.86 + 100.64.31.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.87 + 100.64.31.87 + [] + 0.68359375 + ["Precinct"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.88 + 100.64.31.88 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.89 + 100.64.31.89 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.185 + 100.64.15.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.90 + 100.64.31.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.91 + 100.64.31.91 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.194 + 100.64.29.194 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.92 + 100.64.31.92 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.93 + 100.64.31.93 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233137 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d593f090-8559-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/d/d5965de0-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/d5965de0-6e29-11ee-b3d5-39e2e796f8b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a53b0325657a791d6ed013c67b58ec17d0de5b1f --- /dev/null +++ b/graph/incidents_graphml/d/d5965de0-6e29-11ee-b3d5-39e2e796f8b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.194 + 100.64.51.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697683645 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5965de0-6e29-11ee-b3d5-39e2e796f8b3 + + + diff --git a/graph/incidents_graphml/d/d5989850-076a-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/d/d5989850-076a-11ef-93a8-d78cfa287885.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aafef2f99be21721a01ab6fb3e8efe9ca6e5de16 --- /dev/null +++ b/graph/incidents_graphml/d/d5989850-076a-11ef-93a8-d78cfa287885.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.7 + 100.64.94.7 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1714534090 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d5989850-076a-11ef-93a8-d78cfa287885 + + + INCIDENT_LINK + 1714534090 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d5989850-076a-11ef-93a8-d78cfa287885 + + + diff --git a/graph/incidents_graphml/d/d5a72e70-a9cc-11ee-9a00-5b0bfffd4a52.graphml b/graph/incidents_graphml/d/d5a72e70-a9cc-11ee-9a00-5b0bfffd4a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edee2376d38b7def736fc20d9602c2d800693c7b --- /dev/null +++ b/graph/incidents_graphml/d/d5a72e70-a9cc-11ee-9a00-5b0bfffd4a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.97 + 100.64.58.97 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704240771 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d5a72e70-a9cc-11ee-9a00-5b0bfffd4a52 + + + diff --git a/graph/incidents_graphml/d/d5b678f0-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d5b678f0-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2eb0021545c371e38c4326a950e31ba3af4db79c --- /dev/null +++ b/graph/incidents_graphml/d/d5b678f0-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.251 + 100.64.54.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423799 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5b678f0-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d5b71ba0-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d5b71ba0-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81baa895bbab7a0614a3f7fadfcbd7879d5f47f8 --- /dev/null +++ b/graph/incidents_graphml/d/d5b71ba0-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.185 + 100.64.23.185 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974345 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5b71ba0-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d5c43490-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d5c43490-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ab0de6e2164b1035a15b30026f4d4d476337fea --- /dev/null +++ b/graph/incidents_graphml/d/d5c43490-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.251 + 100.64.54.251 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423799 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d5c43490-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d5c86d90-2225-11ed-8b89-4fe277394604.graphml b/graph/incidents_graphml/d/d5c86d90-2225-11ed-8b89-4fe277394604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0c808516322713c62cf3bff4c667002fed494d5 --- /dev/null +++ b/graph/incidents_graphml/d/d5c86d90-2225-11ed-8b89-4fe277394604.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.3 + 100.64.71.3 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661178141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5c86d90-2225-11ed-8b89-4fe277394604 + + + diff --git a/graph/incidents_graphml/d/d5d39de0-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d5d39de0-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f442ae3d0c571a4519eec6a0b8888d92e3b6e7d0 --- /dev/null +++ b/graph/incidents_graphml/d/d5d39de0-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.253 + 100.64.54.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5d39de0-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d5db1e60-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d5db1e60-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4aee8639e0ffd8111ad93b942749e9e51f93757 --- /dev/null +++ b/graph/incidents_graphml/d/d5db1e60-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.185 + 100.64.23.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974345 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d5db1e60-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d5de69d0-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d5de69d0-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fd59069fa240102b7a21dd098db80077514bed9 --- /dev/null +++ b/graph/incidents_graphml/d/d5de69d0-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.223 + 100.64.15.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650110 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5de69d0-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d5e3ca80-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d5e3ca80-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4257704663e76cdc8d3c02a5ebacdddd0280182c --- /dev/null +++ b/graph/incidents_graphml/d/d5e3ca80-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.253 + 100.64.54.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423800 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d5e3ca80-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d5e655d0-3877-11ee-b68a-37ae93e84217.graphml b/graph/incidents_graphml/d/d5e655d0-3877-11ee-b68a-37ae93e84217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b15654b329f89885931e09d8dd6e7cd2fd08f28 --- /dev/null +++ b/graph/incidents_graphml/d/d5e655d0-3877-11ee-b68a-37ae93e84217.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.23 + 100.64.8.23 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691779783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5e655d0-3877-11ee-b68a-37ae93e84217 + + + diff --git a/graph/incidents_graphml/d/d5e93940-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d5e93940-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..090db54e85c083c9debf02702fb5b041f6a2a7a2 --- /dev/null +++ b/graph/incidents_graphml/d/d5e93940-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.200 + 100.64.48.200 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141586 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d5e93940-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d5eb3440-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/d5eb3440-3d0b-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a671f880ca31dcccef3bdb1ded75f3f9f1e686dc --- /dev/null +++ b/graph/incidents_graphml/d/d5eb3440-3d0b-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.238 + 100.64.59.238 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d5eb3440-3d0b-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/d/d5edd320-5292-11ee-8f98-0be3f6ac6090.graphml b/graph/incidents_graphml/d/d5edd320-5292-11ee-8f98-0be3f6ac6090.graphml new file mode 100644 index 0000000000000000000000000000000000000000..22e0f90423200cabf85ec25efe134ec7bf94392c --- /dev/null +++ b/graph/incidents_graphml/d/d5edd320-5292-11ee-8f98-0be3f6ac6090.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.223 + 100.64.15.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694650110 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d5edd320-5292-11ee-8f98-0be3f6ac6090 + + + diff --git a/graph/incidents_graphml/d/d5f12d40-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/d/d5f12d40-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..250cfdd17f8a0b5b49d0b4e5c9fefc5aee7d9667 --- /dev/null +++ b/graph/incidents_graphml/d/d5f12d40-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.116 + 100.64.93.116 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721029799 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d5f12d40-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/d/d5f965e0-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d5f965e0-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05c2f2129f1bce57e22508ac436fbfba2b9757a9 --- /dev/null +++ b/graph/incidents_graphml/d/d5f965e0-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.200 + 100.64.48.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141586 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d5f965e0-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d5ff0520-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d5ff0520-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e11adbd36a8e0d3d6dac6d26abcf11c6146f0a3 --- /dev/null +++ b/graph/incidents_graphml/d/d5ff0520-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.53 + 100.64.51.53 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790985 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d5ff0520-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d600e9c0-a061-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/d/d600e9c0-a061-11ee-9181-41cbe26a7b16.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff87523a516a1bc2f098676e6d38da073c5a554e --- /dev/null +++ b/graph/incidents_graphml/d/d600e9c0-a061-11ee-9181-41cbe26a7b16.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.51 + 100.64.68.51 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.52 + 100.64.68.52 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.54 + 100.64.68.54 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205255 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d600e9c0-a061-11ee-9181-41cbe26a7b16 + + + diff --git a/graph/incidents_graphml/d/d60115a0-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d60115a0-2111-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf67352abd0f8a5b134b5d1cb9d39b178aa3e286 --- /dev/null +++ b/graph/incidents_graphml/d/d60115a0-2111-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.140 + 100.64.48.140 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689207098 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d60115a0-2111-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/d/d605c4b0-3877-11ee-b68a-37ae93e84217.graphml b/graph/incidents_graphml/d/d605c4b0-3877-11ee-b68a-37ae93e84217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77e567f83c7d7965802c9e630141f4ebd5720a6a --- /dev/null +++ b/graph/incidents_graphml/d/d605c4b0-3877-11ee-b68a-37ae93e84217.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.23 + 100.64.8.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691779783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d605c4b0-3877-11ee-b68a-37ae93e84217 + + + diff --git a/graph/incidents_graphml/d/d6090bf0-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d6090bf0-3170-11ef-ac7f-916edbe5b1d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..477449ed97f7404632d97d7ef5772d6802a0cbb9 --- /dev/null +++ b/graph/incidents_graphml/d/d6090bf0-3170-11ef-ac7f-916edbe5b1d5.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.234 + 100.64.44.234 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.217.241.89 + 10.217.241.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.60.142.8 + 10.60.142.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719154617 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6090bf0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154617 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6090bf0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154617 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6090bf0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154617 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6090bf0-3170-11ef-ac7f-916edbe5b1d5 + + + diff --git a/graph/incidents_graphml/d/d60fcda0-33d3-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/d60fcda0-33d3-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c35e56730d5241b9601e63b67f8260bcc23dd48c --- /dev/null +++ b/graph/incidents_graphml/d/d60fcda0-33d3-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691269541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d60fcda0-33d3-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/d60fea00-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d60fea00-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a74956e8026b9ea246ad96898f80c32939028f7b --- /dev/null +++ b/graph/incidents_graphml/d/d60fea00-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.186 + 100.64.23.186 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974346 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d60fea00-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d60fffe0-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/d/d60fffe0-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d3ac1517269194b923a08f5dfa1f485d7410c22 --- /dev/null +++ b/graph/incidents_graphml/d/d60fffe0-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.116 + 100.64.93.116 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721029799 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d60fffe0-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/d/d6109760-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d6109760-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f68eca30b8c5726f798538d6b153f1ed9486d96 --- /dev/null +++ b/graph/incidents_graphml/d/d6109760-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141586 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d6109760-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d6117bb0-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d6117bb0-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e6910fc47e4cd562e3423406c5b4c9a081cfc46 --- /dev/null +++ b/graph/incidents_graphml/d/d6117bb0-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.53 + 100.64.51.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790985 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d6117bb0-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d61355f0-0e09-11ee-8450-3d12cf9a9e06.graphml b/graph/incidents_graphml/d/d61355f0-0e09-11ee-8450-3d12cf9a9e06.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1687a534120fef78cd6847ee6604aa548af0d55f --- /dev/null +++ b/graph/incidents_graphml/d/d61355f0-0e09-11ee-8450-3d12cf9a9e06.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687114590 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d61355f0-0e09-11ee-8450-3d12cf9a9e06 + + + diff --git a/graph/incidents_graphml/d/d61d0210-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d61d0210-2111-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbaffbad4e905870a6b321669f6695225c552b24 --- /dev/null +++ b/graph/incidents_graphml/d/d61d0210-2111-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689207098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d61d0210-2111-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/d/d61fac80-53da-11ee-9987-e509c23f174a.graphml b/graph/incidents_graphml/d/d61fac80-53da-11ee-9987-e509c23f174a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd7f8c11ff2e9c8e5f3fc966c1a776a8e27cb596 --- /dev/null +++ b/graph/incidents_graphml/d/d61fac80-53da-11ee-9987-e509c23f174a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.122 + 100.64.52.122 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694790985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d61fac80-53da-11ee-9987-e509c23f174a + + + diff --git a/graph/incidents_graphml/d/d62d4720-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d62d4720-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1820f7a66cd4414b20757f004aa5fc0e7a66b30e --- /dev/null +++ b/graph/incidents_graphml/d/d62d4720-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141586 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d62d4720-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d62ff4e0-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d62ff4e0-3170-11ef-ac7f-916edbe5b1d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0cd83e0afd9c4ca59a3d1e136307861988cdc54 --- /dev/null +++ b/graph/incidents_graphml/d/d62ff4e0-3170-11ef-ac7f-916edbe5b1d5.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.74 + 100.64.16.74 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.6 + 100.64.60.6 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719154617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d62ff4e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d62ff4e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d62ff4e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d62ff4e0-3170-11ef-ac7f-916edbe5b1d5 + + + diff --git a/graph/incidents_graphml/d/d6312da0-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d6312da0-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aea0008b2b67492f613faef2cfeb206693384e58 --- /dev/null +++ b/graph/incidents_graphml/d/d6312da0-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.186 + 100.64.23.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d6312da0-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d635cc30-33d3-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/d635cc30-33d3-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..763ce7e751e5b34bdfc1d5afe4405f05f3c68ee2 --- /dev/null +++ b/graph/incidents_graphml/d/d635cc30-33d3-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691269542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d635cc30-33d3-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/d6365670-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d6365670-2111-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b2e3886f51ac98ec877c75afd9db486ddf91abf --- /dev/null +++ b/graph/incidents_graphml/d/d6365670-2111-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689207098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d6365670-2111-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/d/d6444de0-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/d/d6444de0-085f-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..879e1caad086ce5f4ee9ce0eb20aeef2ea827857 --- /dev/null +++ b/graph/incidents_graphml/d/d6444de0-085f-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.46 + 100.64.16.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686491820 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d6444de0-085f-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/d/d6464d60-4df2-11ee-b1dc-abeaf7aaf97f.graphml b/graph/incidents_graphml/d/d6464d60-4df2-11ee-b1dc-abeaf7aaf97f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1b9c76789e23d8c0f61c8e671dbc3fd3b0fb1ff --- /dev/null +++ b/graph/incidents_graphml/d/d6464d60-4df2-11ee-b1dc-abeaf7aaf97f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694141586 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d6464d60-4df2-11ee-b1dc-abeaf7aaf97f + + + diff --git a/graph/incidents_graphml/d/d64fd2c0-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d64fd2c0-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d493cae9b5655a7dd4b5a75003912256c767a0ab --- /dev/null +++ b/graph/incidents_graphml/d/d64fd2c0-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.109 + 100.64.34.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d64fd2c0-6bcc-11ee-ac23-0990c4be3eac + + + INCIDENT_LINK + 1697423800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d64fd2c0-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d64ff190-a9cc-11ee-9a00-5b0bfffd4a52.graphml b/graph/incidents_graphml/d/d64ff190-a9cc-11ee-9a00-5b0bfffd4a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1980ef07823b892ba0bd0c8353dcd5ecbfd85fc --- /dev/null +++ b/graph/incidents_graphml/d/d64ff190-a9cc-11ee-9a00-5b0bfffd4a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.241 + 100.64.24.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704240772 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d64ff190-a9cc-11ee-9a00-5b0bfffd4a52 + + + diff --git a/graph/incidents_graphml/d/d6504710-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d6504710-2111-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66c221043364b1011ccd1d011bc12ba62a5138f7 --- /dev/null +++ b/graph/incidents_graphml/d/d6504710-2111-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.142 + 100.64.48.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689207099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d6504710-2111-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/d/d65449a0-305b-11ef-89a2-c78d159172f4.graphml b/graph/incidents_graphml/d/d65449a0-305b-11ef-89a2-c78d159172f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c320dbca5658ed3078e9fde313c301900399c9e2 --- /dev/null +++ b/graph/incidents_graphml/d/d65449a0-305b-11ef-89a2-c78d159172f4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.86 + 100.64.15.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719035646 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d65449a0-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035646 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d65449a0-305b-11ef-89a2-c78d159172f4 + + + diff --git a/graph/incidents_graphml/d/d654db00-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d654db00-b752-11ed-808d-57d97cd084e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef4201126059f25e291a1aeb9c67cb2e4cc1de7c --- /dev/null +++ b/graph/incidents_graphml/d/d654db00-b752-11ed-808d-57d97cd084e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.92.131 + 100.64.92.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677580192 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d654db00-b752-11ed-808d-57d97cd084e1 + + + diff --git a/graph/incidents_graphml/d/d65ac490-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/d65ac490-d3dd-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5d78feef946022cf193295940a40adab1c6b092 --- /dev/null +++ b/graph/incidents_graphml/d/d65ac490-d3dd-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.160 + 100.64.40.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708866023 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d65ac490-d3dd-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/d/d65c3210-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/d/d65c3210-ee30-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19f0ed3ccc55de309cfe749eae313ef009530b49 --- /dev/null +++ b/graph/incidents_graphml/d/d65c3210-ee30-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.30 + HOST-2906 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.245 + 100.64.76.245 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.141 + USER-0015-1834.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465406 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d65c3210-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465406 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d65c3210-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465406 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d65c3210-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465406 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d65c3210-ee30-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/d/d6602670-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d6602670-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2a054028a064699e05845e9eb6958cd16c490c2 --- /dev/null +++ b/graph/incidents_graphml/d/d6602670-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.109 + 100.64.34.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d6602670-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d6604540-a9cc-11ee-9a00-5b0bfffd4a52.graphml b/graph/incidents_graphml/d/d6604540-a9cc-11ee-9a00-5b0bfffd4a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01878bf3e390460d46674312b5c8e00dc3266140 --- /dev/null +++ b/graph/incidents_graphml/d/d6604540-a9cc-11ee-9a00-5b0bfffd4a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.241 + 100.64.24.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704240773 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6604540-a9cc-11ee-9a00-5b0bfffd4a52 + + + diff --git a/graph/incidents_graphml/d/d66314f0-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d66314f0-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ec6a1fda117f33c9520d77a18af1a88656f7d45 --- /dev/null +++ b/graph/incidents_graphml/d/d66314f0-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.72 + 100.64.21.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d66314f0-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d66cd3e0-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/d/d66cd3e0-ee30-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e12237f0d7ba5f5dcb27e8111e49de8778099a40 --- /dev/null +++ b/graph/incidents_graphml/d/d66cd3e0-ee30-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.31 + 100.64.80.31 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.51 + USER-0015-1783.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465406 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d66cd3e0-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465406 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d66cd3e0-ee30-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/d/d6719f70-085f-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/d/d6719f70-085f-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b34b4f2b1783d6f7d140cca2a607b964bd11c06e --- /dev/null +++ b/graph/incidents_graphml/d/d6719f70-085f-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.46 + 100.64.16.46 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686491820 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d6719f70-085f-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/d/d672a550-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d672a550-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfeadddf31ecfe6a0e12cc1620af7cf05e9ee1ed --- /dev/null +++ b/graph/incidents_graphml/d/d672a550-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.72 + 100.64.21.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770404 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d672a550-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7.graphml b/graph/incidents_graphml/d/d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16f8226f34593469344da52b058230960049cfb2 --- /dev/null +++ b/graph/incidents_graphml/d/d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.79 + 100.64.71.79 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.80 + 100.64.71.80 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.81 + 100.64.71.81 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.83 + 100.64.71.83 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.84 + 100.64.71.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.6.18 + 100.64.6.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d68fa340-2e5c-11ed-9b4d-8fddd3d92ef7 + + + diff --git a/graph/incidents_graphml/d/d697e960-33d3-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/d697e960-33d3-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..400c9069df9490749ec3bad87f0867ef65c0bd77 --- /dev/null +++ b/graph/incidents_graphml/d/d697e960-33d3-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.140 + 100.64.5.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691269542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d697e960-33d3-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/d69892f0-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/d/d69892f0-fc2b-11ed-b0ec-2b4cf5491294.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7060480486c26c946691155662935dd92b0374e --- /dev/null +++ b/graph/incidents_graphml/d/d69892f0-fc2b-11ed-b0ec-2b4cf5491294.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.76 + 100.64.35.76 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685150073 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d69892f0-fc2b-11ed-b0ec-2b4cf5491294 + + + diff --git a/graph/incidents_graphml/d/d6a20fe0-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d6a20fe0-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eadc941e421026bfe2fb7bbb1daa60e3a9c6b674 --- /dev/null +++ b/graph/incidents_graphml/d/d6a20fe0-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.106 + 100.64.34.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186158 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d6a20fe0-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d6abbf80-33d3-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/d6abbf80-33d3-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4363bf712a2b29020475df8cf69825f0c882f8f0 --- /dev/null +++ b/graph/incidents_graphml/d/d6abbf80-33d3-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.140 + 100.64.5.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691269542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d6abbf80-33d3-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/d6b2ffd0-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d6b2ffd0-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f0017183ed7df823866c9da66faef1b460115b9 --- /dev/null +++ b/graph/incidents_graphml/d/d6b2ffd0-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.82 + 100.64.43.82 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186158 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d6b2ffd0-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d6b64af0-285b-11ee-a03d-7b364f1dc27e.graphml b/graph/incidents_graphml/d/d6b64af0-285b-11ee-a03d-7b364f1dc27e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83719c2189cb5c797024d77c390834c8f71c30d6 --- /dev/null +++ b/graph/incidents_graphml/d/d6b64af0-285b-11ee-a03d-7b364f1dc27e.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.173 + 100.64.32.173 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.174 + 100.64.32.174 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.175 + 100.64.32.175 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.171 + 100.64.12.171 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.176 + 100.64.32.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.169 + 100.64.16.169 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.207 + 100.64.9.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.177 + 100.64.32.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.178 + 100.64.32.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.179 + 100.64.32.179 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6b64af0-285b-11ee-a03d-7b364f1dc27e + + + diff --git a/graph/incidents_graphml/d/d6b98870-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/d/d6b98870-fc2b-11ed-b0ec-2b4cf5491294.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cfeed331d262cd1d6a8e597fe7f8b4a8e8dbcd6 --- /dev/null +++ b/graph/incidents_graphml/d/d6b98870-fc2b-11ed-b0ec-2b4cf5491294.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.78 + 100.64.35.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685150073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d6b98870-fc2b-11ed-b0ec-2b4cf5491294 + + + diff --git a/graph/incidents_graphml/d/d6bf0990-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/d/d6bf0990-138b-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11d515e91dacad189d59d6a884ab184437ee492d --- /dev/null +++ b/graph/incidents_graphml/d/d6bf0990-138b-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.83 + 100.64.74.83 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.228 + USER-0015-1671.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.84 + 100.64.74.84 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687720182 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6bf0990-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720182 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6bf0990-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720182 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6bf0990-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720182 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6bf0990-138b-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/d/d6c06d50-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d6c06d50-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a72ea86df174cb6643e9106aaeeb300b2199367 --- /dev/null +++ b/graph/incidents_graphml/d/d6c06d50-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.84 + 100.64.43.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186158 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c06d50-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d6c68960-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d6c68960-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3646db1dd3b6097f4144159678cd94087d159146 --- /dev/null +++ b/graph/incidents_graphml/d/d6c68960-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.175 + 100.64.32.175 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423801 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d6c68960-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d6c9fa00-285b-11ee-a03d-7b364f1dc27e.graphml b/graph/incidents_graphml/d/d6c9fa00-285b-11ee-a03d-7b364f1dc27e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdb0426a6e89ab95eb450763aa7970adb8198bee --- /dev/null +++ b/graph/incidents_graphml/d/d6c9fa00-285b-11ee-a03d-7b364f1dc27e.graphml @@ -0,0 +1,689 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.187 + 100.64.32.187 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.188 + 100.64.32.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.189 + 100.64.32.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.190 + 100.64.32.190 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.191 + 100.64.32.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.192 + 100.64.32.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.193 + 100.64.32.193 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.194 + 100.64.32.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.195 + 100.64.32.195 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.196 + 100.64.32.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.90 + 100.64.12.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.197 + 100.64.32.197 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.198 + 100.64.32.198 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.199 + 100.64.32.199 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.200 + 100.64.32.200 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.201 + 100.64.32.201 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.202 + 100.64.32.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008540 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6c9fa00-285b-11ee-a03d-7b364f1dc27e + + + diff --git a/graph/incidents_graphml/d/d6ce01e0-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d6ce01e0-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1451693cd3126af41d35451c311e89753602a4d9 --- /dev/null +++ b/graph/incidents_graphml/d/d6ce01e0-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.84 + 100.64.43.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186158 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d6ce01e0-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d6d51710-11ca-11ef-a994-fb0e1dc0413b.graphml b/graph/incidents_graphml/d/d6d51710-11ca-11ef-a994-fb0e1dc0413b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1429ba1cb7d2d5b22b8dd5c10a71db67b01437b9 --- /dev/null +++ b/graph/incidents_graphml/d/d6d51710-11ca-11ef-a994-fb0e1dc0413b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.100 + 100.64.57.100 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715674835 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6d51710-11ca-11ef-a994-fb0e1dc0413b + + + diff --git a/graph/incidents_graphml/d/d6d5c300-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/d/d6d5c300-fc2b-11ed-b0ec-2b4cf5491294.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b6bc6a422e3925821d578a9a6ac4e0f0146f643 --- /dev/null +++ b/graph/incidents_graphml/d/d6d5c300-fc2b-11ed-b0ec-2b4cf5491294.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.35.78 + 100.64.35.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685150073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d6d5c300-fc2b-11ed-b0ec-2b4cf5491294 + + + diff --git a/graph/incidents_graphml/d/d6d5f2b0-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d6d5f2b0-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e5fdcca8218fbba06073e4a76c2eeaf0d86f690 --- /dev/null +++ b/graph/incidents_graphml/d/d6d5f2b0-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.175 + 100.64.32.175 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423801 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d6d5f2b0-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d6dbde20-7aca-11ee-8dd4-f72b2f730b80.graphml b/graph/incidents_graphml/d/d6dbde20-7aca-11ee-8dd4-f72b2f730b80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58bf24f143b7a0bcb6ff8ef4d28a75f45d08619a --- /dev/null +++ b/graph/incidents_graphml/d/d6dbde20-7aca-11ee-8dd4-f72b2f730b80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.36.165 + 100.64.36.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699072210 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d6dbde20-7aca-11ee-8dd4-f72b2f730b80 + + + diff --git a/graph/incidents_graphml/d/d6f5d530-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d6f5d530-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea27bb3d42c16287792979334ce609c939d4f4a4 --- /dev/null +++ b/graph/incidents_graphml/d/d6f5d530-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.250 + 100.64.26.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186158 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6f5d530-72bb-11ee-861f-33fd57670a9d + + + INCIDENT_LINK + 1698186158 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d6f5d530-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d703ff90-7aca-11ee-8dd4-f72b2f730b80.graphml b/graph/incidents_graphml/d/d703ff90-7aca-11ee-8dd4-f72b2f730b80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97e2475d02abd5332a0561e105ace67f291a8f45 --- /dev/null +++ b/graph/incidents_graphml/d/d703ff90-7aca-11ee-8dd4-f72b2f730b80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.249 + 100.64.27.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1984.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1699072210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d703ff90-7aca-11ee-8dd4-f72b2f730b80 + + + diff --git a/graph/incidents_graphml/d/d705dac0-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d705dac0-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8fe7211471ad59c2133a3b483700a1f90eee8393 --- /dev/null +++ b/graph/incidents_graphml/d/d705dac0-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.250 + 100.64.26.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186158 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d705dac0-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d70f7860-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d70f7860-2111-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d715fb3117542102b86b9b3ccea208687900f8ed --- /dev/null +++ b/graph/incidents_graphml/d/d70f7860-2111-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.212 + 100.64.47.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689207100 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d70f7860-2111-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/d/d713de10-7aca-11ee-8dd4-f72b2f730b80.graphml b/graph/incidents_graphml/d/d713de10-7aca-11ee-8dd4-f72b2f730b80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6c9bc27dd330858c41ae774ad2e3136de6b990f --- /dev/null +++ b/graph/incidents_graphml/d/d713de10-7aca-11ee-8dd4-f72b2f730b80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1984.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.27.249 + 100.64.27.249 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699072210 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d713de10-7aca-11ee-8dd4-f72b2f730b80 + + + diff --git a/graph/incidents_graphml/d/d71e7e10-fe97-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/d/d71e7e10-fe97-11ed-a08d-35e4f0a9a870.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83cdee78b3e46d4e1a6b4ab53abfe8624726b799 --- /dev/null +++ b/graph/incidents_graphml/d/d71e7e10-fe97-11ed-a08d-35e4f0a9a870.graphml @@ -0,0 +1,251 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.244 + 100.64.45.244 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.22.113 + 100.64.22.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.1 + 100.64.25.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.45.245 + 100.64.45.245 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d71e7e10-fe97-11ed-a08d-35e4f0a9a870 + + + diff --git a/graph/incidents_graphml/d/d7205470-1166-11ed-8727-e3874c058ed5.graphml b/graph/incidents_graphml/d/d7205470-1166-11ed-8727-e3874c058ed5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3d0ead8094fc9d6222ab1ddd38d2d633120f429 --- /dev/null +++ b/graph/incidents_graphml/d/d7205470-1166-11ed-8727-e3874c058ed5.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.87 + 100.64.74.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.85 + 100.64.71.85 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.88 + 100.64.74.88 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.218 + 100.64.71.218 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.89 + 100.64.74.89 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659336891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7205470-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7205470-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7205470-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7205470-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7205470-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7205470-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7205470-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7205470-1166-11ed-8727-e3874c058ed5 + + + diff --git a/graph/incidents_graphml/d/d7221350-3f8c-11ee-9b72-817daf89a87d.graphml b/graph/incidents_graphml/d/d7221350-3f8c-11ee-9b72-817daf89a87d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..836d479981e0953b73e8e8c80816c001d8ae1dc5 --- /dev/null +++ b/graph/incidents_graphml/d/d7221350-3f8c-11ee-9b72-817daf89a87d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.43 + 100.64.14.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692558463 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7221350-3f8c-11ee-9b72-817daf89a87d + + + diff --git a/graph/incidents_graphml/d/d72dae10-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d72dae10-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..674966688723beda77fa310c9a3455e2297fcef0 --- /dev/null +++ b/graph/incidents_graphml/d/d72dae10-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.135 + 100.64.29.135 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186159 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d72dae10-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d73c2690-7aca-11ee-8dd4-f72b2f730b80.graphml b/graph/incidents_graphml/d/d73c2690-7aca-11ee-8dd4-f72b2f730b80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9cc7c2c3bac23b37818d4ed76f03d8388c17c8d3 --- /dev/null +++ b/graph/incidents_graphml/d/d73c2690-7aca-11ee-8dd4-f72b2f730b80.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.145 + 100.64.86.145 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1699072210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d73c2690-7aca-11ee-8dd4-f72b2f730b80 + + + INCIDENT_LINK + 1699072210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d73c2690-7aca-11ee-8dd4-f72b2f730b80 + + + diff --git a/graph/incidents_graphml/d/d73fd680-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d73fd680-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b37756cbdc615f545098fb6ab414f29b12fb7a41 --- /dev/null +++ b/graph/incidents_graphml/d/d73fd680-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.111 + 100.64.21.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186159 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d73fd680-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d74297d0-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/d/d74297d0-02d5-11ef-8e1f-0f6fc7e8988b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84acbd82ae5ed0d0e3508dc05b58200794f59662 --- /dev/null +++ b/graph/incidents_graphml/d/d74297d0-02d5-11ef-8e1f-0f6fc7e8988b.graphml @@ -0,0 +1,315 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.156 + 100.64.17.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.157 + 100.64.17.157 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.17.158 + 100.64.17.158 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.159 + 100.64.17.159 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.160 + 100.64.17.160 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.161 + 100.64.17.161 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.162 + 100.64.17.162 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030293 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74297d0-02d5-11ef-8e1f-0f6fc7e8988b + + + diff --git a/graph/incidents_graphml/d/d745fae0-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d745fae0-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a050aaae3be9d2f5bd4a5a2667ff2f4b68e5091a --- /dev/null +++ b/graph/incidents_graphml/d/d745fae0-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.215 + 100.64.27.215 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770406 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d745fae0-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d74af7c0-ee46-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/d/d74af7c0-ee46-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06fa5d96af95cc824e4d0ac998c1dadba5058c9f --- /dev/null +++ b/graph/incidents_graphml/d/d74af7c0-ee46-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.127 + 100.64.57.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711769852 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d74af7c0-ee46-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/d/d74cfb70-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/d/d74cfb70-f135-11ec-9654-cb9d1f320859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e63b6288e280e6ee4290a6cffb88511935fb934 --- /dev/null +++ b/graph/incidents_graphml/d/d74cfb70-f135-11ec-9654-cb9d1f320859.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.39 + USER-0015-1706.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655797408 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d74cfb70-f135-11ec-9654-cb9d1f320859 + + + diff --git a/graph/incidents_graphml/d/d74ec430-7aca-11ee-8dd4-f72b2f730b80.graphml b/graph/incidents_graphml/d/d74ec430-7aca-11ee-8dd4-f72b2f730b80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e34c1da150be3e3924075675c95d4a79805116f --- /dev/null +++ b/graph/incidents_graphml/d/d74ec430-7aca-11ee-8dd4-f72b2f730b80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.86.145 + 100.64.86.145 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699072211 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d74ec430-7aca-11ee-8dd4-f72b2f730b80 + + + diff --git a/graph/incidents_graphml/d/d7553d20-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d7553d20-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e340dafc97d6be650337fccb8b8153a410f9650 --- /dev/null +++ b/graph/incidents_graphml/d/d7553d20-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.215 + 100.64.27.215 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770406 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7553d20-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d75e0670-7aca-11ee-8dd4-f72b2f730b80.graphml b/graph/incidents_graphml/d/d75e0670-7aca-11ee-8dd4-f72b2f730b80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30c501091a71ee099e50fa9a0d078f0907160513 --- /dev/null +++ b/graph/incidents_graphml/d/d75e0670-7aca-11ee-8dd4-f72b2f730b80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.86.145 + 100.64.86.145 + ["Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699072211 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d75e0670-7aca-11ee-8dd4-f72b2f730b80 + + + diff --git a/graph/incidents_graphml/d/d76037c0-3a3c-11ee-b41f-3f612fcc5cbf.graphml b/graph/incidents_graphml/d/d76037c0-3a3c-11ee-b41f-3f612fcc5cbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65f85b50ff5c65dc6f6dd9e42587718773a837a7 --- /dev/null +++ b/graph/incidents_graphml/d/d76037c0-3a3c-11ee-b41f-3f612fcc5cbf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.189 + 100.64.23.189 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691974348 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d76037c0-3a3c-11ee-b41f-3f612fcc5cbf + + + diff --git a/graph/incidents_graphml/d/d76c3db0-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d76c3db0-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6a162b4312f68fe5e1000be64b455a1df11e5cb --- /dev/null +++ b/graph/incidents_graphml/d/d76c3db0-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.86 + 100.64.43.86 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186159 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d76c3db0-72bb-11ee-861f-33fd57670a9d + + + INCIDENT_LINK + 1698186159 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d76c3db0-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d76ec0b0-6cba-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/d/d76ec0b0-6cba-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2259ebea61b7aa619e86fd026e84865809b5b70 --- /dev/null +++ b/graph/incidents_graphml/d/d76ec0b0-6cba-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.106 + 100.64.34.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.89 + 100.64.72.89 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1669378525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d76ec0b0-6cba-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669378525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d76ec0b0-6cba-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669378525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d76ec0b0-6cba-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669378525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d76ec0b0-6cba-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/d/d7738e60-ee46-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/d/d7738e60-ee46-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e043c936ed928c6636f985defc26be4a63fc02bb --- /dev/null +++ b/graph/incidents_graphml/d/d7738e60-ee46-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.199 + 100.64.12.199 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711769852 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7738e60-ee46-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/d/d77d54b0-72bb-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/d77d54b0-72bb-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21359d49e21770880a5f6ceada7689d66ddf8b53 --- /dev/null +++ b/graph/incidents_graphml/d/d77d54b0-72bb-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.86 + 100.64.43.86 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698186159 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d77d54b0-72bb-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/d782cc80-7aca-11ee-8dd4-f72b2f730b80.graphml b/graph/incidents_graphml/d/d782cc80-7aca-11ee-8dd4-f72b2f730b80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c57dbb5040fb8e01bf5cebc658127e8a7059a198 --- /dev/null +++ b/graph/incidents_graphml/d/d782cc80-7aca-11ee-8dd4-f72b2f730b80.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.37.13 + 172.30.37.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.86.147 + 100.64.86.147 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.148 + 100.64.86.148 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699072211 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d782cc80-7aca-11ee-8dd4-f72b2f730b80 + + + INCIDENT_LINK + 1699072211 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d782cc80-7aca-11ee-8dd4-f72b2f730b80 + + + INCIDENT_LINK + 1699072211 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d782cc80-7aca-11ee-8dd4-f72b2f730b80 + + + INCIDENT_LINK + 1699072211 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d782cc80-7aca-11ee-8dd4-f72b2f730b80 + + + diff --git a/graph/incidents_graphml/d/d783f6c0-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d783f6c0-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d08c9694cc648b2e1b6d61b5112aae597fd44d4 --- /dev/null +++ b/graph/incidents_graphml/d/d783f6c0-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.245 + 100.64.75.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688200790 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d783f6c0-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d7893940-ee46-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/d/d7893940-ee46-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0271d651c9085c196e49671fc1ff3a46582b060e --- /dev/null +++ b/graph/incidents_graphml/d/d7893940-ee46-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.199 + 100.64.12.199 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711769852 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d7893940-ee46-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/d/d790c5f0-11ca-11ef-a994-fb0e1dc0413b.graphml b/graph/incidents_graphml/d/d790c5f0-11ca-11ef-a994-fb0e1dc0413b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4997f0c51bd8b1e597a8b919fc599bc668f3f309 --- /dev/null +++ b/graph/incidents_graphml/d/d790c5f0-11ca-11ef-a994-fb0e1dc0413b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715674837 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d790c5f0-11ca-11ef-a994-fb0e1dc0413b + + + diff --git a/graph/incidents_graphml/d/d791f5e0-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d791f5e0-3170-11ef-ac7f-916edbe5b1d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df4498d9e6d5f90c2418813b6b86e5ec4a55af1f --- /dev/null +++ b/graph/incidents_graphml/d/d791f5e0-3170-11ef-ac7f-916edbe5b1d5.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.100 + 100.64.24.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.8 + 100.64.60.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.9 + 100.64.60.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.68 + 100.64.22.68 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.10 + 100.64.60.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.11 + 100.64.60.11 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d791f5e0-3170-11ef-ac7f-916edbe5b1d5 + + + diff --git a/graph/incidents_graphml/d/d798de50-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d798de50-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28fac43d01501bca4d9d59c887450dd3cbb7c152 --- /dev/null +++ b/graph/incidents_graphml/d/d798de50-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.71 + 100.64.77.71 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688200790 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d798de50-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d79abe90-427e-11ef-ab73-b9dc9970dec3.graphml b/graph/incidents_graphml/d/d79abe90-427e-11ef-ab73-b9dc9970dec3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbc137018497a7c608308a47e636e6425f5567fc --- /dev/null +++ b/graph/incidents_graphml/d/d79abe90-427e-11ef-ab73-b9dc9970dec3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.118 + USER-0015-2104.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721029802 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d79abe90-427e-11ef-ab73-b9dc9970dec3 + + + INCIDENT_LINK + 1721029802 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d79abe90-427e-11ef-ab73-b9dc9970dec3 + + + INCIDENT_LINK + 1721029802 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d79abe90-427e-11ef-ab73-b9dc9970dec3 + + + INCIDENT_LINK + 1721029802 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d79abe90-427e-11ef-ab73-b9dc9970dec3 + + + diff --git a/graph/incidents_graphml/d/d7a31760-fe97-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/d/d7a31760-fe97-11ed-a08d-35e4f0a9a870.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddd096ec2902189847f2e28251b318a1c90a37e1 --- /dev/null +++ b/graph/incidents_graphml/d/d7a31760-fe97-11ed-a08d-35e4f0a9a870.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.248 + 100.64.45.248 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.45.249 + 100.64.45.249 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.223 + 100.64.19.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.45.250 + 100.64.45.250 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.45.251 + 100.64.45.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.252 + 100.64.45.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7a31760-fe97-11ed-a08d-35e4f0a9a870 + + + diff --git a/graph/incidents_graphml/d/d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49881a089fdbf15f999720e67da5f13ca4f63388 --- /dev/null +++ b/graph/incidents_graphml/d/d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5.graphml @@ -0,0 +1,315 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.48 + USER-0015-1437.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.253 + 100.64.20.253 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.16 + 100.64.60.16 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.17 + 100.64.60.17 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.18 + 100.64.60.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.19 + 100.64.60.19 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.223 + USER-0015-1438.example.internal + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.20 + 100.64.60.20 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154619 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7a7c7d0-3170-11ef-ac7f-916edbe5b1d5 + + + diff --git a/graph/incidents_graphml/d/d7ab7bf0-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d7ab7bf0-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..540ddda615ff1cec9bd7a7e2c74e82db783a7d4b --- /dev/null +++ b/graph/incidents_graphml/d/d7ab7bf0-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.71 + 100.64.77.71 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688200790 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7ab7bf0-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d7ae80b0-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d7ae80b0-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fe5acaa540d97d16d64be1311ce78fd91f41dc0 --- /dev/null +++ b/graph/incidents_graphml/d/d7ae80b0-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.223 + 100.64.35.223 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997486 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7ae80b0-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d7af3ae0-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d7af3ae0-b752-11ed-808d-57d97cd084e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0cce664ef3f7324e1c0d10255fe3ea102d314e3 --- /dev/null +++ b/graph/incidents_graphml/d/d7af3ae0-b752-11ed-808d-57d97cd084e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.136 + 100.64.92.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1677580195 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7af3ae0-b752-11ed-808d-57d97cd084e1 + + +