f15hb0wn commited on
Commit
cadbf70
·
verified ·
1 Parent(s): 9b71a88

Upload per-incident GraphML sharded batch 26/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/f/f649e7f0-2929-11ed-82c2-3385aead5ab0.graphml +63 -0
  2. graph/incidents_graphml/f/f6577500-56ff-11ee-82f3-cfca3c4a6159.graphml +63 -0
  3. graph/incidents_graphml/f/f65b8ba0-27a0-11ef-acb4-432fc0d170c1.graphml +63 -0
  4. graph/incidents_graphml/f/f66ee220-e69d-11ee-8f7e-8d09b3cead02.graphml +113 -0
  5. graph/incidents_graphml/f/f6750ce0-7500-11ee-861f-33fd57670a9d.graphml +63 -0
  6. graph/incidents_graphml/f/f67ef850-e53f-11ed-b729-bb6ecc5516ca.graphml +63 -0
  7. graph/incidents_graphml/f/f682c8e0-e53f-11ed-b729-bb6ecc5516ca.graphml +63 -0
  8. graph/incidents_graphml/f/f682da10-9200-11ee-ac87-cff3005068fb.graphml +63 -0
  9. graph/incidents_graphml/f/f685fcd0-7500-11ee-861f-33fd57670a9d.graphml +63 -0
  10. graph/incidents_graphml/f/f68f2b60-6106-11ee-bc15-ebbbf2eb09b5.graphml +85 -0
  11. graph/incidents_graphml/f/f6902fb0-176e-11ee-a7dc-57e99513cc0a.graphml +63 -0
  12. graph/incidents_graphml/f/f69131f0-9200-11ee-ac87-cff3005068fb.graphml +63 -0
  13. graph/incidents_graphml/f/f6937ed0-4e47-11ee-89ef-5bfd6850a1bd.graphml +63 -0
  14. graph/incidents_graphml/f/f6956620-7500-11ee-861f-33fd57670a9d.graphml +63 -0
  15. graph/incidents_graphml/f/f697a9c0-176e-11ee-a7dc-57e99513cc0a.graphml +63 -0
  16. graph/incidents_graphml/f/f69bdf10-8675-11ee-823e-1956338371c0.graphml +85 -0
  17. graph/incidents_graphml/f/f69e4690-6106-11ee-bc15-ebbbf2eb09b5.graphml +63 -0
  18. graph/incidents_graphml/f/f6a2fb10-e53f-11ed-b729-bb6ecc5516ca.graphml +63 -0
  19. graph/incidents_graphml/f/f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02.graphml +63 -0
  20. graph/incidents_graphml/f/f6a87fc0-133f-11ef-90d6-79b9e3bf2217.graphml +221 -0
  21. graph/incidents_graphml/f/f6a98ca0-56ff-11ee-82f3-cfca3c4a6159.graphml +63 -0
  22. graph/incidents_graphml/f/f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f.graphml +63 -0
  23. graph/incidents_graphml/f/f6ab6f70-8675-11ee-823e-1956338371c0.graphml +63 -0
  24. graph/incidents_graphml/f/f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd.graphml +63 -0
  25. graph/incidents_graphml/f/f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml +63 -0
  26. graph/incidents_graphml/f/f6b81a90-ab74-11ed-b288-05f5e2790b36.graphml +63 -0
  27. graph/incidents_graphml/f/f6b880c0-56ff-11ee-82f3-cfca3c4a6159.graphml +63 -0
  28. graph/incidents_graphml/f/f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f.graphml +63 -0
  29. graph/incidents_graphml/f/f6ba4bc0-a00c-11ee-a147-6d5e36330663.graphml +337 -0
  30. graph/incidents_graphml/f/f6bcae70-ab74-11ed-b288-05f5e2790b36.graphml +63 -0
  31. graph/incidents_graphml/f/f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff.graphml +63 -0
  32. graph/incidents_graphml/f/f6c3e2e0-1068-11ee-84f8-b581dff41d6b.graphml +63 -0
  33. graph/incidents_graphml/f/f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02.graphml +63 -0
  34. graph/incidents_graphml/f/f6c883c0-efc3-11ec-9799-0176ac54cf1b.graphml +77 -0
  35. graph/incidents_graphml/f/f6d220b0-efc3-11ec-9799-0176ac54cf1b.graphml +77 -0
  36. graph/incidents_graphml/f/f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml +63 -0
  37. graph/incidents_graphml/f/f6d8e140-b4f1-11ed-9d28-d755eb33fc3e.graphml +63 -0
  38. graph/incidents_graphml/f/f6d925a0-250e-11ee-8dd6-41dd8139c6e5.graphml +63 -0
  39. graph/incidents_graphml/f/f6e06b90-1068-11ee-84f8-b581dff41d6b.graphml +63 -0
  40. graph/incidents_graphml/f/f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02.graphml +63 -0
  41. graph/incidents_graphml/f/f6f45830-a05b-11ed-9aec-656149dc5369.graphml +63 -0
  42. graph/incidents_graphml/f/f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02.graphml +63 -0
  43. graph/incidents_graphml/f/f6f65a00-594c-11ed-aecd-b7c09b1a67fb.graphml +77 -0
  44. graph/incidents_graphml/f/f6f8d200-7b86-11ee-bc5d-534fc2a19f5f.graphml +819 -0
  45. graph/incidents_graphml/f/f6fade70-250e-11ee-8dd6-41dd8139c6e5.graphml +63 -0
  46. graph/incidents_graphml/f/f6fbdc50-f766-11ee-a32a-474576cc2660.graphml +149 -0
  47. graph/incidents_graphml/f/f6fee010-2929-11ed-82c2-3385aead5ab0.graphml +63 -0
  48. graph/incidents_graphml/f/f7003f10-a05b-11ed-9aec-656149dc5369.graphml +63 -0
  49. graph/incidents_graphml/f/f7024110-5eac-11ee-b8f7-eb6c1fc8ba02.graphml +77 -0
  50. graph/incidents_graphml/f/f70bf670-1445-11ef-8b63-6b6087068682.graphml +63 -0
graph/incidents_graphml/f/f649e7f0-2929-11ed-82c2-3385aead5ab0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8e1f4db1-1659-11ed-8912-9bde1500e5d4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.99</data>
35
+ <data key="n_hostname">100.64.80.99</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="b1f24f62-f360-11ec-8996-8d23709a2e3f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.207.79.45</data>
43
+ <data key="n_hostname">100.64.84.55</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="8e1f4db1-1659-11ed-8912-9bde1500e5d4" target="HOST-16899">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1661949572</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f649e7f0-2929-11ed-82c2-3385aead5ab0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6577500-56ff-11ee-82f3-cfca3c4a6159.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.11.166</data>
35
+ <data key="n_hostname">172.31.11.166</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="50acc6f2-4ceb-11ee-bacb-913cc8aaf538">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.64.42</data>
43
+ <data key="n_hostname">100.64.64.42</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2711" target="HOST-10788">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695136784</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6577500-56ff-11ee-82f3-cfca3c4a6159</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f65b8ba0-27a0-11ef-acb4-432fc0d170c1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a1313032-2490-11ee-9589-87c3e88e5568">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.37.193</data>
43
+ <data key="n_hostname">100.64.37.193</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-6896">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1718075775</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f65b8ba0-27a0-11ef-acb4-432fc0d170c1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f66ee220-e69d-11ee-8f7e-8d09b3cead02.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2c875d72-e10c-11ee-87c4-3363658e0d62">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.8.55</data>
35
+ <data key="n_hostname">100.64.8.55</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.21.61.66</data>
43
+ <data key="n_hostname">172.21.61.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="f2919d91-0625-11ee-b19f-ed665a42340f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.40.27</data>
51
+ <data key="n_hostname">100.64.40.27</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-2861" target="HOST-2709">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1710927661</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7890625</data>
61
+ <data key="e_suspicion_score">0.7890625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">f66ee220-e69d-11ee-8f7e-8d09b3cead02</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-2709" target="HOST-2861">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1710927661</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7890625</data>
75
+ <data key="e_suspicion_score">0.7890625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">f66ee220-e69d-11ee-8f7e-8d09b3cead02</data>
83
+ </edge>
84
+ <edge id="e3" source="HOST-7222" target="HOST-2709">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1710927661</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7890625</data>
89
+ <data key="e_suspicion_score">0.7890625</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">f66ee220-e69d-11ee-8f7e-8d09b3cead02</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-2709" target="HOST-7222">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1710927661</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7890625</data>
103
+ <data key="e_suspicion_score">0.7890625</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">f66ee220-e69d-11ee-8f7e-8d09b3cead02</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/f/f6750ce0-7500-11ee-861f-33fd57670a9d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5dd8d784-0626-11ee-b35a-9d13f89576c6">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.21.215</data>
43
+ <data key="n_hostname">100.64.21.215</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2706" target="5dd8d784-0626-11ee-b35a-9d13f89576c6">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698435749</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6750ce0-7500-11ee-861f-33fd57670a9d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f67ef850-e53f-11ed-b729-bb6ecc5516ca.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0038dfa2-e2a2-11ed-99eb-27ef0b496fce">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.28.1</data>
35
+ <data key="n_hostname">100.64.28.1</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="dee0e8d5-a74f-11ed-a907-51beef6de239">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.23</data>
43
+ <data key="n_hostname">100.64.68.23</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]</data>
47
+ </node>
48
+ <edge id="e1" source="0038dfa2-e2a2-11ed-99eb-27ef0b496fce" target="dee0e8d5-a74f-11ed-a907-51beef6de239">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1682629839</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1486","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0040","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f67ef850-e53f-11ed-b729-bb6ecc5516ca</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f682c8e0-e53f-11ed-b729-bb6ecc5516ca.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="dee0e8d5-a74f-11ed-a907-51beef6de239">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.23</data>
35
+ <data key="n_hostname">100.64.68.23</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]</data>
39
+ </node>
40
+ <node id="0038dfa2-e2a2-11ed-99eb-27ef0b496fce">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.28.1</data>
43
+ <data key="n_hostname">100.64.28.1</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11574" target="HOST-11573">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1682629839</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1486","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0040","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f682c8e0-e53f-11ed-b729-bb6ecc5516ca</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f682da10-9200-11ee-ac87-cff3005068fb.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="107c9be0-56e7-11ee-b044-9be6ceaad283">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.15.72</data>
35
+ <data key="n_hostname">100.64.15.72</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4751" target="HOST-2946">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701624332</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f682da10-9200-11ee-ac87-cff3005068fb</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f685fcd0-7500-11ee-861f-33fd57670a9d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4d7285b2-062d-11ee-be26-256556e169f5">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.41.77</data>
35
+ <data key="n_hostname">100.64.41.77</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.201.119</data>
43
+ <data key="n_hostname">172.30.201.119</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-7400" target="HOST-2760">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698435749</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f685fcd0-7500-11ee-861f-33fd57670a9d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f68f2b60-6106-11ee-bc15-ebbbf2eb09b5.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d6645754-48fd-11ee-b721-e5af78e326cb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.30.16</data>
35
+ <data key="n_hostname">100.64.30.16</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.201.119</data>
51
+ <data key="n_hostname">172.30.201.119</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="d6645754-48fd-11ee-b721-e5af78e326cb" target="HOST-2839">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1696239303</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">f68f2b60-6106-11ee-bc15-ebbbf2eb09b5</data>
69
+ </edge>
70
+ <edge id="e2" source="d6645754-48fd-11ee-b721-e5af78e326cb" target="HOST-2760">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1696239303</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">f68f2b60-6106-11ee-bc15-ebbbf2eb09b5</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/f/f6902fb0-176e-11ee-a7dc-57e99513cc0a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="17cb0b61-08f0-11ee-a902-414b7de604fa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.16.236</data>
35
+ <data key="n_hostname">100.64.16.236</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.23</data>
43
+ <data key="n_hostname">100.64.68.23</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="17cb0b61-08f0-11ee-a902-414b7de604fa" target="HOST-11393">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688147584</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.6625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6902fb0-176e-11ee-a7dc-57e99513cc0a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f69131f0-9200-11ee-ac87-cff3005068fb.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="107c9be0-56e7-11ee-b044-9be6ceaad283">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.15.72</data>
43
+ <data key="n_hostname">100.64.15.72</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="HOST-4751">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701624333</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f69131f0-9200-11ee-ac87-cff3005068fb</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6937ed0-4e47-11ee-89ef-5bfd6850a1bd.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.54.66</data>
35
+ <data key="n_hostname">172.24.54.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9b566e72-062a-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.15.184</data>
43
+ <data key="n_hostname">100.64.15.184</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2745" target="HOST-3889">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694178148</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6937ed0-4e47-11ee-89ef-5bfd6850a1bd</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6956620-7500-11ee-861f-33fd57670a9d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.201.119</data>
35
+ <data key="n_hostname">172.30.201.119</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="4d7285b2-062d-11ee-be26-256556e169f5">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.41.77</data>
43
+ <data key="n_hostname">100.64.41.77</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2760" target="HOST-7400">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698435749</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6956620-7500-11ee-861f-33fd57670a9d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f697a9c0-176e-11ee-a7dc-57e99513cc0a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.23</data>
35
+ <data key="n_hostname">100.64.68.23</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="17cb0b61-08f0-11ee-a902-414b7de604fa">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.16.236</data>
43
+ <data key="n_hostname">100.64.16.236</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11393" target="HOST-11464">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688147584</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f697a9c0-176e-11ee-a7dc-57e99513cc0a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f69bdf10-8675-11ee-823e-1956338371c0.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="6c8f6150-247a-11ee-a0fa-3b0e379dbeef">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.11.101</data>
35
+ <data key="n_hostname">100.64.11.101</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.26.73.92</data>
51
+ <data key="n_hostname">172.26.73.92</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="6c8f6150-247a-11ee-a0fa-3b0e379dbeef" target="HOST-2946">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1700355170</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">f69bdf10-8675-11ee-823e-1956338371c0</data>
69
+ </edge>
70
+ <edge id="e2" source="6c8f6150-247a-11ee-a0fa-3b0e379dbeef" target="HOST-2724">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1700355170</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">f69bdf10-8675-11ee-823e-1956338371c0</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/f/f69e4690-6106-11ee-bc15-ebbbf2eb09b5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d6645754-48fd-11ee-b721-e5af78e326cb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.30.16</data>
43
+ <data key="n_hostname">100.64.30.16</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-5888">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696239303</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f69e4690-6106-11ee-bc15-ebbbf2eb09b5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6a2fb10-e53f-11ed-b729-bb6ecc5516ca.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d4162730-a74f-11ed-a907-51beef6de239">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.43</data>
35
+ <data key="n_hostname">100.64.68.43</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]</data>
39
+ </node>
40
+ <node id="eaf46f71-deb8-11ed-831c-711789a7015a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.119</data>
43
+ <data key="n_hostname">100.64.68.119</data>
44
+ <data key="n_set_roles">["Exploiting Host","Ransomware Target","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"]</data>
47
+ </node>
48
+ <edge id="e1" source="d4162730-a74f-11ed-a907-51beef6de239" target="eaf46f71-deb8-11ed-831c-711789a7015a">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1682629840</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1486","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0040","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6a2fb10-e53f-11ed-b729-bb6ecc5516ca</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.182.227</data>
35
+ <data key="n_hostname">172.31.182.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="275a6e62-582b-11ee-ab4e-ab1b18544ee3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.52.165</data>
43
+ <data key="n_hostname">100.64.52.165</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2761" target="275a6e62-582b-11ee-ab4e-ab1b18544ee3">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695980746</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6a87fc0-133f-11ef-90d6-79b9e3bf2217.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e99b1800-062b-11ee-9224-e5648f8494ad">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.2.213</data>
35
+ <data key="n_hostname">100.64.2.213</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.54.66</data>
43
+ <data key="n_hostname">172.24.54.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="4a6cde70-063b-11ee-acf5-638f828625c5">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.29.151</data>
51
+ <data key="n_hostname">100.64.29.151</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="d3c6ebd2-0630-11ee-9214-1bded255d0fa">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.44.17</data>
59
+ <data key="n_hostname">100.64.44.17</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="5a6440d2-c71e-11ee-a9b3-33db0833998c">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.56.221</data>
67
+ <data key="n_hostname">100.64.56.221</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall","Stealthwatch"]</data>
71
+ </node>
72
+ <node id="81817830-bc52-11ee-96bf-7dd9452b0c80">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.56.222</data>
75
+ <data key="n_hostname">100.64.56.222</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <edge id="e1" source="HOST-6084" target="HOST-2745">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1715835091</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.7890625</data>
85
+ <data key="e_suspicion_score">0.7890625</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-2745" target="HOST-6084">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1715835091</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.7890625</data>
99
+ <data key="e_suspicion_score">0.7890625</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
107
+ </edge>
108
+ <edge id="e3" source="HOST-5827" target="HOST-2745">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1715835091</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.7890625</data>
113
+ <data key="e_suspicion_score">0.7890625</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-2745" target="HOST-5827">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1715835091</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.7890625</data>
127
+ <data key="e_suspicion_score">0.7890625</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
135
+ </edge>
136
+ <edge id="e5" source="HOST-2745" target="HOST-7803">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1715835091</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.7890625</data>
141
+ <data key="e_suspicion_score">0.7890625</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-7803" target="HOST-2745">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1715835091</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.7890625</data>
155
+ <data key="e_suspicion_score">0.7890625</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
163
+ </edge>
164
+ <edge id="e7" source="5a6440d2-c71e-11ee-a9b3-33db0833998c" target="HOST-2745">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1715835091</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.7890625</data>
169
+ <data key="e_suspicion_score">0.7890625</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-2745" target="5a6440d2-c71e-11ee-a9b3-33db0833998c">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1715835091</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.7890625</data>
183
+ <data key="e_suspicion_score">0.7890625</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
191
+ </edge>
192
+ <edge id="e9" source="81817830-bc52-11ee-96bf-7dd9452b0c80" target="HOST-2745">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1715835091</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.7890625</data>
197
+ <data key="e_suspicion_score">0.7890625</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
205
+ </edge>
206
+ <edge id="e10" source="HOST-2745" target="81817830-bc52-11ee-96bf-7dd9452b0c80">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1715835091</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.7890625</data>
211
+ <data key="e_suspicion_score">0.7890625</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">f6a87fc0-133f-11ef-90d6-79b9e3bf2217</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/f/f6a98ca0-56ff-11ee-82f3-cfca3c4a6159.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="985a70c2-55f0-11ee-b427-95d76dc316fe">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.64.44</data>
35
+ <data key="n_hostname">100.64.64.44</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="985a70c2-55f0-11ee-b427-95d76dc316fe" target="HOST-2858">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695136785</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6a98ca0-56ff-11ee-82f3-cfca3c4a6159</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a6e8ebb0-0881-11ee-8972-418e454ee8d0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.11.154</data>
35
+ <data key="n_hostname">100.64.11.154</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3317" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699153008</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6ab6f70-8675-11ee-823e-1956338371c0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="6c8f6150-247a-11ee-a0fa-3b0e379dbeef">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.11.101</data>
43
+ <data key="n_hostname">100.64.11.101</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="HOST-3292">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700355170</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6ab6f70-8675-11ee-823e-1956338371c0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1bab47e0-0634-11ee-bbd4-132bcd7d23ed">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.24.17</data>
43
+ <data key="n_hostname">100.64.24.17</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-5018">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694178148</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="275a6e62-582b-11ee-ab4e-ab1b18544ee3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.52.165</data>
35
+ <data key="n_hostname">100.64.52.165</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.182.227</data>
43
+ <data key="n_hostname">172.31.182.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-9098" target="HOST-2761">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695980746</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6b81a90-ab74-11ed-b288-05f5e2790b36.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f59c2340-ab74-11ed-af04-eff77038ed01">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.92.226</data>
35
+ <data key="n_hostname">100.64.92.226</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f9783d0-9d8d-11ed-8ff2-3593b92fed96">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.184.211.180</data>
43
+ <data key="n_hostname">100.64.6.51</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="f59c2340-ab74-11ed-af04-eff77038ed01" target="HOST-17146">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676275436</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6b81a90-ab74-11ed-b288-05f5e2790b36</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6b880c0-56ff-11ee-82f3-cfca3c4a6159.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.158.1</data>
35
+ <data key="n_hostname">172.29.158.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="985a70c2-55f0-11ee-b427-95d76dc316fe">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.64.44</data>
43
+ <data key="n_hostname">100.64.64.44</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2858" target="HOST-10789">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695136785</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6b880c0-56ff-11ee-82f3-cfca3c4a6159</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6e8ebb0-0881-11ee-8972-418e454ee8d0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.11.154</data>
43
+ <data key="n_hostname">100.64.11.154</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-3317">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699153009</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6ba4bc0-a00c-11ee-a147-6d5e36330663.graphml ADDED
@@ -0,0 +1,337 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bab5f234-83cb-11ee-8fa6-77181c369f68">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.10.44</data>
35
+ <data key="n_hostname">100.64.10.44</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.217.8</data>
43
+ <data key="n_hostname">172.24.217.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="29eed300-0628-11ee-a360-0d0424c09388">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.15.150</data>
51
+ <data key="n_hostname">100.64.15.150</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.30.168.48</data>
59
+ <data key="n_hostname">172.30.168.48</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="142e3a01-9855-11ee-8e7d-09d9ab97f2fd">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.41.98</data>
67
+ <data key="n_hostname">100.64.41.98</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="803493b0-0625-11ee-8578-99ce994a4216">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.9.191</data>
75
+ <data key="n_hostname">100.64.9.191</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">172.24.191.229</data>
83
+ <data key="n_hostname">172.24.191.229</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="bb4cd7a6-74fc-11ee-9980-d10badfb7cb5">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.10.199</data>
91
+ <data key="n_hostname">100.64.10.199</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="0b539b71-3c46-11ee-a54f-bf248e62ce84">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.23.75</data>
99
+ <data key="n_hostname">100.64.23.75</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">172.26.73.92</data>
107
+ <data key="n_hostname">172.26.73.92</data>
108
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <edge id="e1" source="HOST-3132" target="HOST-2731">
113
+ <data key="e_type">INCIDENT_LINK</data>
114
+ <data key="e_timestamp">1703168803</data>
115
+ <data key="e_label_binary">malicious</data>
116
+ <data key="e_label_confidence">0.7</data>
117
+ <data key="e_suspicion_score">0.25</data>
118
+ <data key="e_mo_name">Data Theft</data>
119
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
120
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
121
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
122
+ <data key="e_lifecycle_stage">complete-mission</data>
123
+ <data key="e_disposition">Unprocessed</data>
124
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
125
+ </edge>
126
+ <edge id="e2" source="HOST-2731" target="HOST-3132">
127
+ <data key="e_type">INCIDENT_LINK</data>
128
+ <data key="e_timestamp">1703168803</data>
129
+ <data key="e_label_binary">malicious</data>
130
+ <data key="e_label_confidence">0.7</data>
131
+ <data key="e_suspicion_score">0.25</data>
132
+ <data key="e_mo_name">Data Theft</data>
133
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
134
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
135
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
136
+ <data key="e_lifecycle_stage">complete-mission</data>
137
+ <data key="e_disposition">Unprocessed</data>
138
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
139
+ </edge>
140
+ <edge id="e3" source="HOST-3868" target="HOST-2731">
141
+ <data key="e_type">INCIDENT_LINK</data>
142
+ <data key="e_timestamp">1703168803</data>
143
+ <data key="e_label_binary">malicious</data>
144
+ <data key="e_label_confidence">0.7</data>
145
+ <data key="e_suspicion_score">0.25</data>
146
+ <data key="e_mo_name">Data Theft</data>
147
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
148
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
149
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
150
+ <data key="e_lifecycle_stage">complete-mission</data>
151
+ <data key="e_disposition">Unprocessed</data>
152
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
153
+ </edge>
154
+ <edge id="e4" source="HOST-2731" target="HOST-3868">
155
+ <data key="e_type">INCIDENT_LINK</data>
156
+ <data key="e_timestamp">1703168803</data>
157
+ <data key="e_label_binary">malicious</data>
158
+ <data key="e_label_confidence">0.7</data>
159
+ <data key="e_suspicion_score">0.25</data>
160
+ <data key="e_mo_name">Data Theft</data>
161
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
162
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
163
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
164
+ <data key="e_lifecycle_stage">complete-mission</data>
165
+ <data key="e_disposition">Unprocessed</data>
166
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
167
+ </edge>
168
+ <edge id="e5" source="HOST-2842" target="142e3a01-9855-11ee-8e7d-09d9ab97f2fd">
169
+ <data key="e_type">INCIDENT_LINK</data>
170
+ <data key="e_timestamp">1703168803</data>
171
+ <data key="e_label_binary">malicious</data>
172
+ <data key="e_label_confidence">0.7</data>
173
+ <data key="e_suspicion_score">0.25</data>
174
+ <data key="e_mo_name">Data Theft</data>
175
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
176
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
177
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
178
+ <data key="e_lifecycle_stage">complete-mission</data>
179
+ <data key="e_disposition">Unprocessed</data>
180
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
181
+ </edge>
182
+ <edge id="e6" source="142e3a01-9855-11ee-8e7d-09d9ab97f2fd" target="HOST-2842">
183
+ <data key="e_type">INCIDENT_LINK</data>
184
+ <data key="e_timestamp">1703168803</data>
185
+ <data key="e_label_binary">malicious</data>
186
+ <data key="e_label_confidence">0.7</data>
187
+ <data key="e_suspicion_score">0.25</data>
188
+ <data key="e_mo_name">Data Theft</data>
189
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
190
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
191
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
192
+ <data key="e_lifecycle_stage">complete-mission</data>
193
+ <data key="e_disposition">Unprocessed</data>
194
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
195
+ </edge>
196
+ <edge id="e7" source="HOST-3132" target="HOST-2842">
197
+ <data key="e_type">INCIDENT_LINK</data>
198
+ <data key="e_timestamp">1703168803</data>
199
+ <data key="e_label_binary">malicious</data>
200
+ <data key="e_label_confidence">0.7</data>
201
+ <data key="e_suspicion_score">0.25</data>
202
+ <data key="e_mo_name">Data Theft</data>
203
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
204
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
205
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
206
+ <data key="e_lifecycle_stage">complete-mission</data>
207
+ <data key="e_disposition">Unprocessed</data>
208
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
209
+ </edge>
210
+ <edge id="e8" source="HOST-2842" target="HOST-3132">
211
+ <data key="e_type">INCIDENT_LINK</data>
212
+ <data key="e_timestamp">1703168803</data>
213
+ <data key="e_label_binary">malicious</data>
214
+ <data key="e_label_confidence">0.7</data>
215
+ <data key="e_suspicion_score">0.25</data>
216
+ <data key="e_mo_name">Data Theft</data>
217
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
218
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
219
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
220
+ <data key="e_lifecycle_stage">complete-mission</data>
221
+ <data key="e_disposition">Unprocessed</data>
222
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
223
+ </edge>
224
+ <edge id="e9" source="HOST-3073" target="HOST-2839">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1703168803</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.7</data>
229
+ <data key="e_suspicion_score">0.25</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Unprocessed</data>
236
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
237
+ </edge>
238
+ <edge id="e10" source="HOST-2839" target="HOST-3073">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1703168803</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.7</data>
243
+ <data key="e_suspicion_score">0.25</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Unprocessed</data>
250
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
251
+ </edge>
252
+ <edge id="e11" source="HOST-3132" target="HOST-2839">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1703168803</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.7</data>
257
+ <data key="e_suspicion_score">0.25</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Unprocessed</data>
264
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
265
+ </edge>
266
+ <edge id="e12" source="HOST-2839" target="HOST-3132">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1703168803</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.7</data>
271
+ <data key="e_suspicion_score">0.25</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Unprocessed</data>
278
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
279
+ </edge>
280
+ <edge id="e13" source="HOST-3211" target="HOST-2731">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1703168803</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.7</data>
285
+ <data key="e_suspicion_score">0.25</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Unprocessed</data>
292
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
293
+ </edge>
294
+ <edge id="e14" source="HOST-2731" target="HOST-3211">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1703168803</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.7</data>
299
+ <data key="e_suspicion_score">0.25</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Unprocessed</data>
306
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
307
+ </edge>
308
+ <edge id="e15" source="HOST-4914" target="HOST-2724">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1703168803</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.7</data>
313
+ <data key="e_suspicion_score">0.25</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Unprocessed</data>
320
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
321
+ </edge>
322
+ <edge id="e16" source="HOST-2724" target="HOST-4914">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1703168803</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.7</data>
327
+ <data key="e_suspicion_score">0.25</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Unprocessed</data>
334
+ <data key="e_incident_id">f6ba4bc0-a00c-11ee-a147-6d5e36330663</data>
335
+ </edge>
336
+ </graph>
337
+ </graphml>
graph/incidents_graphml/f/f6bcae70-ab74-11ed-b288-05f5e2790b36.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9f9783d0-9d8d-11ed-8ff2-3593b92fed96">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.184.211.180</data>
35
+ <data key="n_hostname">100.64.6.51</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="f59c2340-ab74-11ed-af04-eff77038ed01">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.226</data>
43
+ <data key="n_hostname">100.64.92.226</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17146" target="HOST-18357">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676275436</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6bcae70-ab74-11ed-b288-05f5e2790b36</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1541e592-0629-11ee-b144-2b760827f5b0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.21.149</data>
35
+ <data key="n_hostname">USER-0015-1235.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.201.119</data>
43
+ <data key="n_hostname">172.30.201.119</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4845" target="HOST-2760">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687182935</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6c3e2e0-1068-11ee-84f8-b581dff41d6b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4ac2bd41-0654-11ee-a353-51ab027cb4e4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.15.229</data>
35
+ <data key="n_hostname">USER-0015-1209.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="4ac2bd41-0654-11ee-a353-51ab027cb4e4" target="HOST-2703">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687375349</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6c3e2e0-1068-11ee-84f8-b581dff41d6b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f6043202-5eac-11ee-a379-33a560d4965c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.52.167</data>
35
+ <data key="n_hostname">100.64.52.167</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.135.251.191</data>
43
+ <data key="n_hostname">10.135.251.191</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="f6043202-5eac-11ee-a379-33a560d4965c" target="HOST-2751">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695980746</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6c883c0-efc3-11ec-9799-0176ac54cf1b.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fca8dc41-ec26-11ec-96f6-010b6cf3b4aa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.164</data>
35
+ <data key="n_hostname">100.64.80.164</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="4e270e70-ea92-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.133</data>
43
+ <data key="n_hostname">100.64.72.133</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="fca8dc41-ec26-11ec-96f6-010b6cf3b4aa" target="HOST-13348">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655638547</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6c883c0-efc3-11ec-9799-0176ac54cf1b</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13348" target="fca8dc41-ec26-11ec-96f6-010b6cf3b4aa">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1655638547</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">f6c883c0-efc3-11ec-9799-0176ac54cf1b</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/f/f6d220b0-efc3-11ec-9799-0176ac54cf1b.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d5829640-ea93-11ec-abf7-619673fe2558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.8.180</data>
35
+ <data key="n_hostname">100.64.8.180</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="dd5f71a0-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.92</data>
43
+ <data key="n_hostname">USER-0015-1614.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="d5829640-ea93-11ec-abf7-619673fe2558" target="HOST-12654">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655638548</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6d220b0-efc3-11ec-9799-0176ac54cf1b</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-12654" target="d5829640-ea93-11ec-abf7-619673fe2558">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1655638548</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">f6d220b0-efc3-11ec-9799-0176ac54cf1b</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/f/f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.135.251.191</data>
35
+ <data key="n_hostname">10.135.251.191</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="f6043202-5eac-11ee-a379-33a560d4965c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.52.167</data>
43
+ <data key="n_hostname">100.64.52.167</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2751" target="HOST-9099">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695980746</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6d8e140-b4f1-11ed-9d28-d755eb33fc3e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f48319d6-9dd9-11ed-99f2-df6be930b38c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.156</data>
35
+ <data key="n_hostname">100.64.68.156</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="2a422704-aabe-11ed-ad78-0d50fdff7d5f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.221.82.8</data>
43
+ <data key="n_hostname">10.221.82.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="f48319d6-9dd9-11ed-99f2-df6be930b38c" target="HOST-16909">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1677318683</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6d8e140-b4f1-11ed-9d28-d755eb33fc3e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6d925a0-250e-11ee-8dd6-41dd8139c6e5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e9d38c20-0636-11ee-8679-7ff0d95439f0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.61</data>
35
+ <data key="n_hostname">100.64.76.61</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="e9d38c20-0636-11ee-8679-7ff0d95439f0" target="HOST-13083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689645669</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6d925a0-250e-11ee-8dd6-41dd8139c6e5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6e06b90-1068-11ee-84f8-b581dff41d6b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.27.202.53</data>
35
+ <data key="n_hostname">172.27.202.53</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="4ac2bd41-0654-11ee-a353-51ab027cb4e4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.15.229</data>
43
+ <data key="n_hostname">USER-0015-1209.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2703" target="HOST-3908">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687375350</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6e06b90-1068-11ee-84f8-b581dff41d6b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="275a6e62-582b-11ee-ab4e-ab1b18544ee3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.52.165</data>
43
+ <data key="n_hostname">100.64.52.165</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-9098">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695980746</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6f45830-a05b-11ed-9aec-656149dc5369.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9a7310b3-9d9a-11ed-837f-75a8a3783d85">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.14.104</data>
35
+ <data key="n_hostname">100.64.14.104</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c2bb4de0-9e2f-11ed-9f74-736119d17d35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">10.74.211.215</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="9a7310b3-9d9a-11ed-837f-75a8a3783d85" target="HOST-16916">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1675055236</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6f45830-a05b-11ed-9aec-656149dc5369</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="275a6e62-582b-11ee-ab4e-ab1b18544ee3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.52.165</data>
35
+ <data key="n_hostname">100.64.52.165</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-9098" target="HOST-2821">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695980746</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6f65a00-594c-11ed-aecd-b7c09b1a67fb.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b9918c03-4c33-11ed-8722-6dc0750d71a4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.71.113</data>
35
+ <data key="n_hostname">100.64.71.113</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="88447663-41a9-11ed-a587-21753cf039e4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.114</data>
43
+ <data key="n_hostname">100.64.71.114</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b9918c03-4c33-11ed-8722-6dc0750d71a4" target="88447663-41a9-11ed-a587-21753cf039e4">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1667242261</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6f65a00-594c-11ed-aecd-b7c09b1a67fb</data>
61
+ </edge>
62
+ <edge id="e2" source="88447663-41a9-11ed-a587-21753cf039e4" target="b9918c03-4c33-11ed-8722-6dc0750d71a4">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1667242261</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">f6f65a00-594c-11ed-aecd-b7c09b1a67fb</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/f/f6f8d200-7b86-11ee-bc5d-534fc2a19f5f.graphml ADDED
@@ -0,0 +1,819 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d58869f5-6d12-11ee-9d50-1b085f19ca55">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.22.163</data>
35
+ <data key="n_hostname">100.64.22.163</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.88134765625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.233.43</data>
43
+ <data key="n_hostname">172.16.233.43</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.29.40.149</data>
51
+ <data key="n_hostname">172.29.40.149</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="efffd9b1-0626-11ee-8578-99ce994a4216">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.8.240</data>
59
+ <data key="n_hostname">100.64.8.240</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.22.127.96</data>
67
+ <data key="n_hostname">172.22.127.96</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.9208984375</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="89a6e0a0-099b-11ee-91b0-e781537a8a9c">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.22.164</data>
75
+ <data key="n_hostname">100.64.22.164</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="c11a7b91-062c-11ee-99df-0b00eb1bed47">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.22.165</data>
83
+ <data key="n_hostname">100.64.22.165</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="d428a3f3-0669-11ee-b2d8-0f94e4d14ba1">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.22.166</data>
91
+ <data key="n_hostname">100.64.22.166</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="767f0080-51b1-11ee-a6a9-db5c93c2c945">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.22.167</data>
99
+ <data key="n_hostname">100.64.22.167</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.7890625</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="375dd012-7b4c-11ee-a9a6-bb116c48031a">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.22.168</data>
107
+ <data key="n_hostname">100.64.22.168</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.4375</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="3815b320-6d0e-11ee-a107-dfcf344f8582">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.10.152</data>
115
+ <data key="n_hostname">100.64.10.152</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.7890625</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">172.24.54.66</data>
123
+ <data key="n_hostname">172.24.54.66</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.9208984375</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="14641011-0626-11ee-9a0c-b9f8978d847e">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.22.169</data>
131
+ <data key="n_hostname">100.64.22.169</data>
132
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.71875</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="0da097e2-32b2-11ee-a1fb-4f54f91a66cd">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.17.224</data>
139
+ <data key="n_hostname">100.64.17.224</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.7890625</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="034d42c0-49b4-11ee-9374-e71d380ee913">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.12.179</data>
147
+ <data key="n_hostname">100.64.12.179</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.578125</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="a334cfc0-41d9-11ee-aebd-89c5153498f6">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.22.170</data>
155
+ <data key="n_hostname">100.64.22.170</data>
156
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
157
+ <data key="n_suspicion_score">0.7890625</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="a7f25cc1-314f-11ee-9a4d-b51ddc9c6936">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.22.171</data>
163
+ <data key="n_hostname">100.64.22.171</data>
164
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
165
+ <data key="n_suspicion_score">0.71875</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="fb872a02-0625-11ee-b173-c9921719c2f8">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.22.172</data>
171
+ <data key="n_hostname">100.64.22.172</data>
172
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
173
+ <data key="n_suspicion_score">0.71875</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">172.16.232.220</data>
179
+ <data key="n_hostname">172.16.232.220</data>
180
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
181
+ <data key="n_suspicion_score">0.71875</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">172.23.168.229</data>
187
+ <data key="n_hostname">172.23.168.229</data>
188
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
189
+ <data key="n_suspicion_score">0.71875</data>
190
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
191
+ </node>
192
+ <node id="3abe32f0-0639-11ee-add5-396975dfb2e3">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">100.64.22.173</data>
195
+ <data key="n_hostname">100.64.22.173</data>
196
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
197
+ <data key="n_suspicion_score">0.71875</data>
198
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
199
+ </node>
200
+ <node id="ffe5db40-7278-11ee-b16a-a1b426d30f69">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">100.64.22.174</data>
203
+ <data key="n_hostname">100.64.22.174</data>
204
+ <data key="n_set_roles">["Exploiting Host"]</data>
205
+ <data key="n_suspicion_score">0.578125</data>
206
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
207
+ </node>
208
+ <node id="96d807b1-0629-11ee-87d2-5909d78e9e20">
209
+ <data key="n_type">HOST</data>
210
+ <data key="n_ip">100.64.10.235</data>
211
+ <data key="n_hostname">100.64.10.235</data>
212
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
213
+ <data key="n_suspicion_score">0.71875</data>
214
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
215
+ </node>
216
+ <edge id="e1" source="d58869f5-6d12-11ee-9d50-1b085f19ca55" target="HOST-2758">
217
+ <data key="e_type">INCIDENT_LINK</data>
218
+ <data key="e_timestamp">1699153009</data>
219
+ <data key="e_label_binary">malicious</data>
220
+ <data key="e_label_confidence">0.9208984375</data>
221
+ <data key="e_suspicion_score">0.9208984375</data>
222
+ <data key="e_mo_name">Data Theft</data>
223
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
224
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
225
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
226
+ <data key="e_lifecycle_stage">complete-mission</data>
227
+ <data key="e_disposition">Disrupted</data>
228
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
229
+ </edge>
230
+ <edge id="e2" source="d58869f5-6d12-11ee-9d50-1b085f19ca55" target="HOST-2834">
231
+ <data key="e_type">INCIDENT_LINK</data>
232
+ <data key="e_timestamp">1699153009</data>
233
+ <data key="e_label_binary">malicious</data>
234
+ <data key="e_label_confidence">0.9208984375</data>
235
+ <data key="e_suspicion_score">0.9208984375</data>
236
+ <data key="e_mo_name">Data Theft</data>
237
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
238
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
239
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
240
+ <data key="e_lifecycle_stage">complete-mission</data>
241
+ <data key="e_disposition">Disrupted</data>
242
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
243
+ </edge>
244
+ <edge id="e3" source="HOST-2959" target="HOST-2726">
245
+ <data key="e_type">INCIDENT_LINK</data>
246
+ <data key="e_timestamp">1699153009</data>
247
+ <data key="e_label_binary">malicious</data>
248
+ <data key="e_label_confidence">0.9208984375</data>
249
+ <data key="e_suspicion_score">0.9208984375</data>
250
+ <data key="e_mo_name">Data Theft</data>
251
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
252
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
253
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
254
+ <data key="e_lifecycle_stage">complete-mission</data>
255
+ <data key="e_disposition">Disrupted</data>
256
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
257
+ </edge>
258
+ <edge id="e4" source="HOST-2726" target="HOST-2959">
259
+ <data key="e_type">INCIDENT_LINK</data>
260
+ <data key="e_timestamp">1699153009</data>
261
+ <data key="e_label_binary">malicious</data>
262
+ <data key="e_label_confidence">0.9208984375</data>
263
+ <data key="e_suspicion_score">0.9208984375</data>
264
+ <data key="e_mo_name">Data Theft</data>
265
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
266
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
267
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
268
+ <data key="e_lifecycle_stage">complete-mission</data>
269
+ <data key="e_disposition">Disrupted</data>
270
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
271
+ </edge>
272
+ <edge id="e5" source="89a6e0a0-099b-11ee-91b0-e781537a8a9c" target="HOST-2726">
273
+ <data key="e_type">INCIDENT_LINK</data>
274
+ <data key="e_timestamp">1699153009</data>
275
+ <data key="e_label_binary">malicious</data>
276
+ <data key="e_label_confidence">0.9208984375</data>
277
+ <data key="e_suspicion_score">0.9208984375</data>
278
+ <data key="e_mo_name">Data Theft</data>
279
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
280
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
281
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
282
+ <data key="e_lifecycle_stage">complete-mission</data>
283
+ <data key="e_disposition">Disrupted</data>
284
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
285
+ </edge>
286
+ <edge id="e6" source="HOST-2726" target="89a6e0a0-099b-11ee-91b0-e781537a8a9c">
287
+ <data key="e_type">INCIDENT_LINK</data>
288
+ <data key="e_timestamp">1699153009</data>
289
+ <data key="e_label_binary">malicious</data>
290
+ <data key="e_label_confidence">0.9208984375</data>
291
+ <data key="e_suspicion_score">0.9208984375</data>
292
+ <data key="e_mo_name">Data Theft</data>
293
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
294
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
295
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
296
+ <data key="e_lifecycle_stage">complete-mission</data>
297
+ <data key="e_disposition">Disrupted</data>
298
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
299
+ </edge>
300
+ <edge id="e7" source="c11a7b91-062c-11ee-99df-0b00eb1bed47" target="HOST-2726">
301
+ <data key="e_type">INCIDENT_LINK</data>
302
+ <data key="e_timestamp">1699153009</data>
303
+ <data key="e_label_binary">malicious</data>
304
+ <data key="e_label_confidence">0.9208984375</data>
305
+ <data key="e_suspicion_score">0.9208984375</data>
306
+ <data key="e_mo_name">Data Theft</data>
307
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
308
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
309
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
310
+ <data key="e_lifecycle_stage">complete-mission</data>
311
+ <data key="e_disposition">Disrupted</data>
312
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
313
+ </edge>
314
+ <edge id="e8" source="HOST-2726" target="c11a7b91-062c-11ee-99df-0b00eb1bed47">
315
+ <data key="e_type">INCIDENT_LINK</data>
316
+ <data key="e_timestamp">1699153009</data>
317
+ <data key="e_label_binary">malicious</data>
318
+ <data key="e_label_confidence">0.9208984375</data>
319
+ <data key="e_suspicion_score">0.9208984375</data>
320
+ <data key="e_mo_name">Data Theft</data>
321
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
322
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
323
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
324
+ <data key="e_lifecycle_stage">complete-mission</data>
325
+ <data key="e_disposition">Disrupted</data>
326
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
327
+ </edge>
328
+ <edge id="e9" source="d428a3f3-0669-11ee-b2d8-0f94e4d14ba1" target="HOST-2726">
329
+ <data key="e_type">INCIDENT_LINK</data>
330
+ <data key="e_timestamp">1699153009</data>
331
+ <data key="e_label_binary">malicious</data>
332
+ <data key="e_label_confidence">0.9208984375</data>
333
+ <data key="e_suspicion_score">0.9208984375</data>
334
+ <data key="e_mo_name">Data Theft</data>
335
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
336
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
337
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
338
+ <data key="e_lifecycle_stage">complete-mission</data>
339
+ <data key="e_disposition">Disrupted</data>
340
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
341
+ </edge>
342
+ <edge id="e10" source="HOST-2726" target="d428a3f3-0669-11ee-b2d8-0f94e4d14ba1">
343
+ <data key="e_type">INCIDENT_LINK</data>
344
+ <data key="e_timestamp">1699153009</data>
345
+ <data key="e_label_binary">malicious</data>
346
+ <data key="e_label_confidence">0.9208984375</data>
347
+ <data key="e_suspicion_score">0.9208984375</data>
348
+ <data key="e_mo_name">Data Theft</data>
349
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
350
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
351
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
352
+ <data key="e_lifecycle_stage">complete-mission</data>
353
+ <data key="e_disposition">Disrupted</data>
354
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
355
+ </edge>
356
+ <edge id="e11" source="767f0080-51b1-11ee-a6a9-db5c93c2c945" target="HOST-2726">
357
+ <data key="e_type">INCIDENT_LINK</data>
358
+ <data key="e_timestamp">1699153009</data>
359
+ <data key="e_label_binary">malicious</data>
360
+ <data key="e_label_confidence">0.9208984375</data>
361
+ <data key="e_suspicion_score">0.9208984375</data>
362
+ <data key="e_mo_name">Data Theft</data>
363
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
364
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
365
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
366
+ <data key="e_lifecycle_stage">complete-mission</data>
367
+ <data key="e_disposition">Disrupted</data>
368
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
369
+ </edge>
370
+ <edge id="e12" source="HOST-2726" target="767f0080-51b1-11ee-a6a9-db5c93c2c945">
371
+ <data key="e_type">INCIDENT_LINK</data>
372
+ <data key="e_timestamp">1699153009</data>
373
+ <data key="e_label_binary">malicious</data>
374
+ <data key="e_label_confidence">0.9208984375</data>
375
+ <data key="e_suspicion_score">0.9208984375</data>
376
+ <data key="e_mo_name">Data Theft</data>
377
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
378
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
379
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
380
+ <data key="e_lifecycle_stage">complete-mission</data>
381
+ <data key="e_disposition">Disrupted</data>
382
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
383
+ </edge>
384
+ <edge id="e13" source="375dd012-7b4c-11ee-a9a6-bb116c48031a" target="HOST-2726">
385
+ <data key="e_type">INCIDENT_LINK</data>
386
+ <data key="e_timestamp">1699153009</data>
387
+ <data key="e_label_binary">malicious</data>
388
+ <data key="e_label_confidence">0.9208984375</data>
389
+ <data key="e_suspicion_score">0.9208984375</data>
390
+ <data key="e_mo_name">Data Theft</data>
391
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
392
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
393
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
394
+ <data key="e_lifecycle_stage">complete-mission</data>
395
+ <data key="e_disposition">Disrupted</data>
396
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
397
+ </edge>
398
+ <edge id="e14" source="HOST-2726" target="375dd012-7b4c-11ee-a9a6-bb116c48031a">
399
+ <data key="e_type">INCIDENT_LINK</data>
400
+ <data key="e_timestamp">1699153009</data>
401
+ <data key="e_label_binary">malicious</data>
402
+ <data key="e_label_confidence">0.9208984375</data>
403
+ <data key="e_suspicion_score">0.9208984375</data>
404
+ <data key="e_mo_name">Data Theft</data>
405
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
406
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
407
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
408
+ <data key="e_lifecycle_stage">complete-mission</data>
409
+ <data key="e_disposition">Disrupted</data>
410
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
411
+ </edge>
412
+ <edge id="e15" source="3815b320-6d0e-11ee-a107-dfcf344f8582" target="HOST-2726">
413
+ <data key="e_type">INCIDENT_LINK</data>
414
+ <data key="e_timestamp">1699153009</data>
415
+ <data key="e_label_binary">malicious</data>
416
+ <data key="e_label_confidence">0.9208984375</data>
417
+ <data key="e_suspicion_score">0.9208984375</data>
418
+ <data key="e_mo_name">Data Theft</data>
419
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
420
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
421
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
422
+ <data key="e_lifecycle_stage">complete-mission</data>
423
+ <data key="e_disposition">Disrupted</data>
424
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
425
+ </edge>
426
+ <edge id="e16" source="HOST-2726" target="3815b320-6d0e-11ee-a107-dfcf344f8582">
427
+ <data key="e_type">INCIDENT_LINK</data>
428
+ <data key="e_timestamp">1699153009</data>
429
+ <data key="e_label_binary">malicious</data>
430
+ <data key="e_label_confidence">0.9208984375</data>
431
+ <data key="e_suspicion_score">0.9208984375</data>
432
+ <data key="e_mo_name">Data Theft</data>
433
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
434
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
435
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
436
+ <data key="e_lifecycle_stage">complete-mission</data>
437
+ <data key="e_disposition">Disrupted</data>
438
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
439
+ </edge>
440
+ <edge id="e17" source="d58869f5-6d12-11ee-9d50-1b085f19ca55" target="HOST-2726">
441
+ <data key="e_type">INCIDENT_LINK</data>
442
+ <data key="e_timestamp">1699153009</data>
443
+ <data key="e_label_binary">malicious</data>
444
+ <data key="e_label_confidence">0.9208984375</data>
445
+ <data key="e_suspicion_score">0.9208984375</data>
446
+ <data key="e_mo_name">Data Theft</data>
447
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
448
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
449
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
450
+ <data key="e_lifecycle_stage">complete-mission</data>
451
+ <data key="e_disposition">Disrupted</data>
452
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
453
+ </edge>
454
+ <edge id="e18" source="HOST-2726" target="d58869f5-6d12-11ee-9d50-1b085f19ca55">
455
+ <data key="e_type">INCIDENT_LINK</data>
456
+ <data key="e_timestamp">1699153009</data>
457
+ <data key="e_label_binary">malicious</data>
458
+ <data key="e_label_confidence">0.9208984375</data>
459
+ <data key="e_suspicion_score">0.9208984375</data>
460
+ <data key="e_mo_name">Data Theft</data>
461
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
462
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
463
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
464
+ <data key="e_lifecycle_stage">complete-mission</data>
465
+ <data key="e_disposition">Disrupted</data>
466
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
467
+ </edge>
468
+ <edge id="e19" source="HOST-2745" target="14641011-0626-11ee-9a0c-b9f8978d847e">
469
+ <data key="e_type">INCIDENT_LINK</data>
470
+ <data key="e_timestamp">1699153009</data>
471
+ <data key="e_label_binary">malicious</data>
472
+ <data key="e_label_confidence">0.9208984375</data>
473
+ <data key="e_suspicion_score">0.9208984375</data>
474
+ <data key="e_mo_name">Data Theft</data>
475
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
476
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
477
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
478
+ <data key="e_lifecycle_stage">complete-mission</data>
479
+ <data key="e_disposition">Disrupted</data>
480
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
481
+ </edge>
482
+ <edge id="e20" source="14641011-0626-11ee-9a0c-b9f8978d847e" target="HOST-2745">
483
+ <data key="e_type">INCIDENT_LINK</data>
484
+ <data key="e_timestamp">1699153009</data>
485
+ <data key="e_label_binary">malicious</data>
486
+ <data key="e_label_confidence">0.9208984375</data>
487
+ <data key="e_suspicion_score">0.9208984375</data>
488
+ <data key="e_mo_name">Data Theft</data>
489
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
490
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
491
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
492
+ <data key="e_lifecycle_stage">complete-mission</data>
493
+ <data key="e_disposition">Disrupted</data>
494
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
495
+ </edge>
496
+ <edge id="e21" source="HOST-4177" target="HOST-2745">
497
+ <data key="e_type">INCIDENT_LINK</data>
498
+ <data key="e_timestamp">1699153009</data>
499
+ <data key="e_label_binary">malicious</data>
500
+ <data key="e_label_confidence">0.9208984375</data>
501
+ <data key="e_suspicion_score">0.9208984375</data>
502
+ <data key="e_mo_name">Data Theft</data>
503
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
504
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
505
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
506
+ <data key="e_lifecycle_stage">complete-mission</data>
507
+ <data key="e_disposition">Disrupted</data>
508
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
509
+ </edge>
510
+ <edge id="e22" source="HOST-2745" target="HOST-4177">
511
+ <data key="e_type">INCIDENT_LINK</data>
512
+ <data key="e_timestamp">1699153009</data>
513
+ <data key="e_label_binary">malicious</data>
514
+ <data key="e_label_confidence">0.9208984375</data>
515
+ <data key="e_suspicion_score">0.9208984375</data>
516
+ <data key="e_mo_name">Data Theft</data>
517
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
518
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
519
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
520
+ <data key="e_lifecycle_stage">complete-mission</data>
521
+ <data key="e_disposition">Disrupted</data>
522
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
523
+ </edge>
524
+ <edge id="e23" source="HOST-3448" target="HOST-2745">
525
+ <data key="e_type">INCIDENT_LINK</data>
526
+ <data key="e_timestamp">1699153009</data>
527
+ <data key="e_label_binary">malicious</data>
528
+ <data key="e_label_confidence">0.9208984375</data>
529
+ <data key="e_suspicion_score">0.9208984375</data>
530
+ <data key="e_mo_name">Data Theft</data>
531
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
532
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
533
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
534
+ <data key="e_lifecycle_stage">complete-mission</data>
535
+ <data key="e_disposition">Disrupted</data>
536
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
537
+ </edge>
538
+ <edge id="e24" source="HOST-2745" target="HOST-3448">
539
+ <data key="e_type">INCIDENT_LINK</data>
540
+ <data key="e_timestamp">1699153009</data>
541
+ <data key="e_label_binary">malicious</data>
542
+ <data key="e_label_confidence">0.9208984375</data>
543
+ <data key="e_suspicion_score">0.9208984375</data>
544
+ <data key="e_mo_name">Data Theft</data>
545
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
546
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
547
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
548
+ <data key="e_lifecycle_stage">complete-mission</data>
549
+ <data key="e_disposition">Disrupted</data>
550
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
551
+ </edge>
552
+ <edge id="e25" source="a334cfc0-41d9-11ee-aebd-89c5153498f6" target="HOST-2745">
553
+ <data key="e_type">INCIDENT_LINK</data>
554
+ <data key="e_timestamp">1699153009</data>
555
+ <data key="e_label_binary">malicious</data>
556
+ <data key="e_label_confidence">0.9208984375</data>
557
+ <data key="e_suspicion_score">0.9208984375</data>
558
+ <data key="e_mo_name">Data Theft</data>
559
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
560
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
561
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
562
+ <data key="e_lifecycle_stage">complete-mission</data>
563
+ <data key="e_disposition">Disrupted</data>
564
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
565
+ </edge>
566
+ <edge id="e26" source="HOST-2745" target="a334cfc0-41d9-11ee-aebd-89c5153498f6">
567
+ <data key="e_type">INCIDENT_LINK</data>
568
+ <data key="e_timestamp">1699153009</data>
569
+ <data key="e_label_binary">malicious</data>
570
+ <data key="e_label_confidence">0.9208984375</data>
571
+ <data key="e_suspicion_score">0.9208984375</data>
572
+ <data key="e_mo_name">Data Theft</data>
573
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
574
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
575
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
576
+ <data key="e_lifecycle_stage">complete-mission</data>
577
+ <data key="e_disposition">Disrupted</data>
578
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
579
+ </edge>
580
+ <edge id="e27" source="a7f25cc1-314f-11ee-9a4d-b51ddc9c6936" target="HOST-2745">
581
+ <data key="e_type">INCIDENT_LINK</data>
582
+ <data key="e_timestamp">1699153009</data>
583
+ <data key="e_label_binary">malicious</data>
584
+ <data key="e_label_confidence">0.9208984375</data>
585
+ <data key="e_suspicion_score">0.9208984375</data>
586
+ <data key="e_mo_name">Data Theft</data>
587
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
588
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
589
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
590
+ <data key="e_lifecycle_stage">complete-mission</data>
591
+ <data key="e_disposition">Disrupted</data>
592
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
593
+ </edge>
594
+ <edge id="e28" source="HOST-2745" target="a7f25cc1-314f-11ee-9a4d-b51ddc9c6936">
595
+ <data key="e_type">INCIDENT_LINK</data>
596
+ <data key="e_timestamp">1699153009</data>
597
+ <data key="e_label_binary">malicious</data>
598
+ <data key="e_label_confidence">0.9208984375</data>
599
+ <data key="e_suspicion_score">0.9208984375</data>
600
+ <data key="e_mo_name">Data Theft</data>
601
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
602
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
603
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
604
+ <data key="e_lifecycle_stage">complete-mission</data>
605
+ <data key="e_disposition">Disrupted</data>
606
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
607
+ </edge>
608
+ <edge id="e29" source="fb872a02-0625-11ee-b173-c9921719c2f8" target="HOST-2745">
609
+ <data key="e_type">INCIDENT_LINK</data>
610
+ <data key="e_timestamp">1699153009</data>
611
+ <data key="e_label_binary">malicious</data>
612
+ <data key="e_label_confidence">0.9208984375</data>
613
+ <data key="e_suspicion_score">0.9208984375</data>
614
+ <data key="e_mo_name">Data Theft</data>
615
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
616
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
617
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
618
+ <data key="e_lifecycle_stage">complete-mission</data>
619
+ <data key="e_disposition">Disrupted</data>
620
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
621
+ </edge>
622
+ <edge id="e30" source="HOST-2745" target="fb872a02-0625-11ee-b173-c9921719c2f8">
623
+ <data key="e_type">INCIDENT_LINK</data>
624
+ <data key="e_timestamp">1699153009</data>
625
+ <data key="e_label_binary">malicious</data>
626
+ <data key="e_label_confidence">0.9208984375</data>
627
+ <data key="e_suspicion_score">0.9208984375</data>
628
+ <data key="e_mo_name">Data Theft</data>
629
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
630
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
631
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
632
+ <data key="e_lifecycle_stage">complete-mission</data>
633
+ <data key="e_disposition">Disrupted</data>
634
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
635
+ </edge>
636
+ <edge id="e31" source="HOST-4177" target="HOST-2748">
637
+ <data key="e_type">INCIDENT_LINK</data>
638
+ <data key="e_timestamp">1699153009</data>
639
+ <data key="e_label_binary">malicious</data>
640
+ <data key="e_label_confidence">0.9208984375</data>
641
+ <data key="e_suspicion_score">0.9208984375</data>
642
+ <data key="e_mo_name">Data Theft</data>
643
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
644
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
645
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
646
+ <data key="e_lifecycle_stage">complete-mission</data>
647
+ <data key="e_disposition">Disrupted</data>
648
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
649
+ </edge>
650
+ <edge id="e32" source="fb872a02-0625-11ee-b173-c9921719c2f8" target="HOST-2865">
651
+ <data key="e_type">INCIDENT_LINK</data>
652
+ <data key="e_timestamp">1699153009</data>
653
+ <data key="e_label_binary">malicious</data>
654
+ <data key="e_label_confidence">0.9208984375</data>
655
+ <data key="e_suspicion_score">0.9208984375</data>
656
+ <data key="e_mo_name">Data Theft</data>
657
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
658
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
659
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
660
+ <data key="e_lifecycle_stage">complete-mission</data>
661
+ <data key="e_disposition">Disrupted</data>
662
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
663
+ </edge>
664
+ <edge id="e33" source="3abe32f0-0639-11ee-add5-396975dfb2e3" target="HOST-2745">
665
+ <data key="e_type">INCIDENT_LINK</data>
666
+ <data key="e_timestamp">1699153009</data>
667
+ <data key="e_label_binary">malicious</data>
668
+ <data key="e_label_confidence">0.9208984375</data>
669
+ <data key="e_suspicion_score">0.9208984375</data>
670
+ <data key="e_mo_name">Data Theft</data>
671
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
672
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
673
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
674
+ <data key="e_lifecycle_stage">complete-mission</data>
675
+ <data key="e_disposition">Disrupted</data>
676
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
677
+ </edge>
678
+ <edge id="e34" source="HOST-2745" target="3abe32f0-0639-11ee-add5-396975dfb2e3">
679
+ <data key="e_type">INCIDENT_LINK</data>
680
+ <data key="e_timestamp">1699153009</data>
681
+ <data key="e_label_binary">malicious</data>
682
+ <data key="e_label_confidence">0.9208984375</data>
683
+ <data key="e_suspicion_score">0.9208984375</data>
684
+ <data key="e_mo_name">Data Theft</data>
685
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
686
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
687
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
688
+ <data key="e_lifecycle_stage">complete-mission</data>
689
+ <data key="e_disposition">Disrupted</data>
690
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
691
+ </edge>
692
+ <edge id="e35" source="ffe5db40-7278-11ee-b16a-a1b426d30f69" target="HOST-2745">
693
+ <data key="e_type">INCIDENT_LINK</data>
694
+ <data key="e_timestamp">1699153009</data>
695
+ <data key="e_label_binary">malicious</data>
696
+ <data key="e_label_confidence">0.9208984375</data>
697
+ <data key="e_suspicion_score">0.9208984375</data>
698
+ <data key="e_mo_name">Data Theft</data>
699
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
700
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
701
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
702
+ <data key="e_lifecycle_stage">complete-mission</data>
703
+ <data key="e_disposition">Disrupted</data>
704
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
705
+ </edge>
706
+ <edge id="e36" source="HOST-2745" target="ffe5db40-7278-11ee-b16a-a1b426d30f69">
707
+ <data key="e_type">INCIDENT_LINK</data>
708
+ <data key="e_timestamp">1699153009</data>
709
+ <data key="e_label_binary">malicious</data>
710
+ <data key="e_label_confidence">0.9208984375</data>
711
+ <data key="e_suspicion_score">0.9208984375</data>
712
+ <data key="e_mo_name">Data Theft</data>
713
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
714
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
715
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
716
+ <data key="e_lifecycle_stage">complete-mission</data>
717
+ <data key="e_disposition">Disrupted</data>
718
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
719
+ </edge>
720
+ <edge id="e37" source="3815b320-6d0e-11ee-a107-dfcf344f8582" target="HOST-2745">
721
+ <data key="e_type">INCIDENT_LINK</data>
722
+ <data key="e_timestamp">1699153009</data>
723
+ <data key="e_label_binary">malicious</data>
724
+ <data key="e_label_confidence">0.9208984375</data>
725
+ <data key="e_suspicion_score">0.9208984375</data>
726
+ <data key="e_mo_name">Data Theft</data>
727
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
728
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
729
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
730
+ <data key="e_lifecycle_stage">complete-mission</data>
731
+ <data key="e_disposition">Disrupted</data>
732
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
733
+ </edge>
734
+ <edge id="e38" source="HOST-2745" target="3815b320-6d0e-11ee-a107-dfcf344f8582">
735
+ <data key="e_type">INCIDENT_LINK</data>
736
+ <data key="e_timestamp">1699153009</data>
737
+ <data key="e_label_binary">malicious</data>
738
+ <data key="e_label_confidence">0.9208984375</data>
739
+ <data key="e_suspicion_score">0.9208984375</data>
740
+ <data key="e_mo_name">Data Theft</data>
741
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
742
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
743
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
744
+ <data key="e_lifecycle_stage">complete-mission</data>
745
+ <data key="e_disposition">Disrupted</data>
746
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
747
+ </edge>
748
+ <edge id="e39" source="HOST-2726" target="HOST-3235">
749
+ <data key="e_type">INCIDENT_LINK</data>
750
+ <data key="e_timestamp">1699153009</data>
751
+ <data key="e_label_binary">malicious</data>
752
+ <data key="e_label_confidence">0.9208984375</data>
753
+ <data key="e_suspicion_score">0.9208984375</data>
754
+ <data key="e_mo_name">Data Theft</data>
755
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
756
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
757
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
758
+ <data key="e_lifecycle_stage">complete-mission</data>
759
+ <data key="e_disposition">Disrupted</data>
760
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
761
+ </edge>
762
+ <edge id="e40" source="HOST-3235" target="HOST-2726">
763
+ <data key="e_type">INCIDENT_LINK</data>
764
+ <data key="e_timestamp">1699153009</data>
765
+ <data key="e_label_binary">malicious</data>
766
+ <data key="e_label_confidence">0.9208984375</data>
767
+ <data key="e_suspicion_score">0.9208984375</data>
768
+ <data key="e_mo_name">Data Theft</data>
769
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
770
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
771
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
772
+ <data key="e_lifecycle_stage">complete-mission</data>
773
+ <data key="e_disposition">Disrupted</data>
774
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
775
+ </edge>
776
+ <edge id="e41" source="d58869f5-6d12-11ee-9d50-1b085f19ca55" target="HOST-2865">
777
+ <data key="e_type">INCIDENT_LINK</data>
778
+ <data key="e_timestamp">1699153009</data>
779
+ <data key="e_label_binary">malicious</data>
780
+ <data key="e_label_confidence">0.9208984375</data>
781
+ <data key="e_suspicion_score">0.9208984375</data>
782
+ <data key="e_mo_name">Data Theft</data>
783
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
784
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
785
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
786
+ <data key="e_lifecycle_stage">complete-mission</data>
787
+ <data key="e_disposition">Disrupted</data>
788
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
789
+ </edge>
790
+ <edge id="e42" source="d58869f5-6d12-11ee-9d50-1b085f19ca55" target="HOST-2745">
791
+ <data key="e_type">INCIDENT_LINK</data>
792
+ <data key="e_timestamp">1699153009</data>
793
+ <data key="e_label_binary">malicious</data>
794
+ <data key="e_label_confidence">0.9208984375</data>
795
+ <data key="e_suspicion_score">0.9208984375</data>
796
+ <data key="e_mo_name">Data Theft</data>
797
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
798
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
799
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
800
+ <data key="e_lifecycle_stage">complete-mission</data>
801
+ <data key="e_disposition">Disrupted</data>
802
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
803
+ </edge>
804
+ <edge id="e43" source="HOST-2745" target="d58869f5-6d12-11ee-9d50-1b085f19ca55">
805
+ <data key="e_type">INCIDENT_LINK</data>
806
+ <data key="e_timestamp">1699153009</data>
807
+ <data key="e_label_binary">malicious</data>
808
+ <data key="e_label_confidence">0.9208984375</data>
809
+ <data key="e_suspicion_score">0.9208984375</data>
810
+ <data key="e_mo_name">Data Theft</data>
811
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
812
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
813
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
814
+ <data key="e_lifecycle_stage">complete-mission</data>
815
+ <data key="e_disposition">Disrupted</data>
816
+ <data key="e_incident_id">f6f8d200-7b86-11ee-bc5d-534fc2a19f5f</data>
817
+ </edge>
818
+ </graph>
819
+ </graphml>
graph/incidents_graphml/f/f6fade70-250e-11ee-8dd6-41dd8139c6e5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="e9d38c20-0636-11ee-8679-7ff0d95439f0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.76.61</data>
43
+ <data key="n_hostname">100.64.76.61</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13083" target="HOST-14044">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689645669</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f6fade70-250e-11ee-8dd6-41dd8139c6e5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f6fbdc50-f766-11ee-a32a-474576cc2660.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="63e21b10-90ef-11ee-a5e6-4dc0e72e8161">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.171.187.67</data>
35
+ <data key="n_hostname">10.171.187.67</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.9208984375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","Vulnerability Management"]</data>
39
+ </node>
40
+ <node id="526144b1-0a03-11ee-8ad2-778845762e5a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.124</data>
43
+ <data key="n_hostname">100.64.70.124</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <node id="c2c14d92-edf6-11ee-a726-53de915248d4">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.70.125</data>
51
+ <data key="n_hostname">100.64.70.125</data>
52
+ <data key="n_set_roles">["Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="a9993f30-e239-11ee-a591-01b168746f8c">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.70.126</data>
59
+ <data key="n_hostname">100.64.70.126</data>
60
+ <data key="n_set_roles">["Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.4375</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <edge id="e1" source="63e21b10-90ef-11ee-a5e6-4dc0e72e8161" target="526144b1-0a03-11ee-8ad2-778845762e5a">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1712773209</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.9208984375</data>
69
+ <data key="e_suspicion_score">0.9208984375</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">f6fbdc50-f766-11ee-a32a-474576cc2660</data>
77
+ </edge>
78
+ <edge id="e2" source="526144b1-0a03-11ee-8ad2-778845762e5a" target="63e21b10-90ef-11ee-a5e6-4dc0e72e8161">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1712773209</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.9208984375</data>
83
+ <data key="e_suspicion_score">0.9208984375</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">f6fbdc50-f766-11ee-a32a-474576cc2660</data>
91
+ </edge>
92
+ <edge id="e3" source="63e21b10-90ef-11ee-a5e6-4dc0e72e8161" target="c2c14d92-edf6-11ee-a726-53de915248d4">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1712773209</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.9208984375</data>
97
+ <data key="e_suspicion_score">0.9208984375</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">f6fbdc50-f766-11ee-a32a-474576cc2660</data>
105
+ </edge>
106
+ <edge id="e4" source="c2c14d92-edf6-11ee-a726-53de915248d4" target="63e21b10-90ef-11ee-a5e6-4dc0e72e8161">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1712773209</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.9208984375</data>
111
+ <data key="e_suspicion_score">0.9208984375</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">f6fbdc50-f766-11ee-a32a-474576cc2660</data>
119
+ </edge>
120
+ <edge id="e5" source="63e21b10-90ef-11ee-a5e6-4dc0e72e8161" target="a9993f30-e239-11ee-a591-01b168746f8c">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1712773209</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.9208984375</data>
125
+ <data key="e_suspicion_score">0.9208984375</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">f6fbdc50-f766-11ee-a32a-474576cc2660</data>
133
+ </edge>
134
+ <edge id="e6" source="a9993f30-e239-11ee-a591-01b168746f8c" target="63e21b10-90ef-11ee-a5e6-4dc0e72e8161">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1712773209</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.9208984375</data>
139
+ <data key="e_suspicion_score">0.9208984375</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">f6fbdc50-f766-11ee-a32a-474576cc2660</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/f/f6fee010-2929-11ed-82c2-3385aead5ab0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7acd14f3-2887-11ed-8ef1-039293e5834b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.85.238</data>
35
+ <data key="n_hostname">100.64.85.238</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ab33c381-f49a-11ec-acf0-6ba76852b533">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.55.52.223</data>
43
+ <data key="n_hostname">10.55.52.223</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="7acd14f3-2887-11ed-8ef1-039293e5834b" target="HOST-16895">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1661949573</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f6fee010-2929-11ed-82c2-3385aead5ab0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f7003f10-a05b-11ed-9aec-656149dc5369.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c2bb4de0-9e2f-11ed-9f74-736119d17d35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9a7310b3-9d9a-11ed-837f-75a8a3783d85">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.14.104</data>
43
+ <data key="n_hostname">100.64.14.104</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.8875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16916" target="HOST-18043">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1675055236</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.8875</data>
53
+ <data key="e_suspicion_score">0.8875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f7003f10-a05b-11ed-9aec-656149dc5369</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/f7024110-5eac-11ee-b8f7-eb6c1fc8ba02.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.54.66</data>
35
+ <data key="n_hostname">172.24.54.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="23fd6961-0629-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.7.250</data>
43
+ <data key="n_hostname">100.64.7.250</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2745" target="HOST-2826">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695980746</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">f7024110-5eac-11ee-b8f7-eb6c1fc8ba02</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-2826" target="HOST-2745">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1695980746</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">f7024110-5eac-11ee-b8f7-eb6c1fc8ba02</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/f/f70bf670-1445-11ef-8b63-6b6087068682.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bcc612b0-13c4-11ef-a4c2-593ee087f46f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.52.129</data>
35
+ <data key="n_hostname">100.64.52.129</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.96.192</data>
43
+ <data key="n_hostname">172.18.96.192</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="bcc612b0-13c4-11ef-a4c2-593ee087f46f" target="HOST-2715">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715947620</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">f70bf670-1445-11ef-8b63-6b6087068682</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>