text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_fin7_20251115T233407000Z_0002201","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Credential Access","Collection"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20261206T133308000Z_0002... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250926T101934000Z_0002205","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261111T012246000Z_0002207","ground_truth":{"detection_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Impact","Discovery"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260829T074938000Z_0002209","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250731T055052000Z_0002211","ground_truth":{"detection_guidance":"Sigma rule for T1059.00... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Exfiltration","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpan... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261021T140253000Z_0002215","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Defense Evasion","Impact"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260511T113357000Z_0002217","ground_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Credential Access","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251223T044723000Z_0002219","groun... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Privilege Escalation","Collection"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260521T082641... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Reconnaissance","Discovery"],"technique_id":"T1531"},"event_id":"evt_apt29_20260210T052250000Z_0002223","ground_truth"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Persistence","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251208T0... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260712T140925000Z_0002227","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Defense Evasion","Execution"],"technique_id":"T1570"},"event_id":"evt_apt41_20250402T081302000Z_0002229","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251120T122635000Z_0002231","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250423T162520000Z_0002233","ground_truth":{"detection_guidance":"Sigma rule for T105... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Persistence","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260717T222357000Z_0002235... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Collection","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250329T074129000Z_0002237","ground_tru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Command and Control","Initial Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251001T021051000Z_0002... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Execution","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251001T182214000Z_0002241","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Command and Control","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspid... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20251227T023625000Z_0002245","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250518T153517000Z_0002247","ground_truth":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Reconnaissance","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_2... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Defense Evasion","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_mustangpa... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Command and Control","Collection"],"technique_id":"T1570"},"event_id":"evt_apt29_20250819T145523000Z_0002253","ground_truth":{"detection_guida... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250828T021412000Z_00022... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250413T180530000Z_0002257","gr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Command and Control","Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260424T052533000Z_0002259","ground_truth":{"detect... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20261123T040233000Z_0002261","ground... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261215T050630000Z_0002263","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Collection"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20261006T015200000Z_0002265","ground_truth":{"detect... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Credential Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251129T035601000Z_0002267","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Lateral Movement","Collection"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260227T184611000Z_0002269","ground_tr... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Initial Access","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250414T224837000Z_0002271","ground_trut... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250611T041646000Z_0002273","ground_truth":{"detection_guida... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20251221T045049000Z_0002275","ground_truth":{"detection_guidance":"Sigma rule for T105... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_apt41_20250220T190839000Z_0002277","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250702T215134000Z_0002279",... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260827T032713000Z_0002281","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Lateral Movement","Execution"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260129T161055000Z_0002283","ground_truth":{"detection_gui... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250313T220... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Command and Control","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261226T140209000Z_0002287","gro... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Persistence","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250801T081649000Z_0002289","ground_truth":{... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Collection"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250310T004230000Z_0002291","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260306T184413000Z_0002293","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Privilege Escalation","Collection"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251103T095203000Z_0002295","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20251209T164717000Z_0002297","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20251101T083901000Z_0002299","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Persistence","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_scatter... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260325T041301000Z_0002303","ground_t... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250404T182348000Z_0002305","ground_truth":{"detection_g... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_apt41_20250918T183254000Z_0002307","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260320T111718000Z_0002309","ground_truth":{... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261122T161723000Z_0002311","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Defense Evasion","Impact"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260626T045219000Z_0002313","ground_truth":{"detecti... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260314T065002000Z_0002315","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251203T132202000Z_0002317","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_fin7_20260202T135021000Z_0002319","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_fin7_20250901T013951000Z_0002321","ground_truth":{"detection_gui... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261106T223909000Z_0002323","ground_truth":{"detec... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Credential Access","Execution"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260615T173043000Z_0002325","ground_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Initial Access","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_202505... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250403T175146000Z_0002329","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20261214T134148000Z_0002331","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250919T150327000Z_0002333","ground_truth":{"detection_guidance":"Sigma rule for T1059.0... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250322T204619000Z_0002335","ground_truth":{"detection_gui... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250205T075653000Z_0002337","ground_truth":{"detectio... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250416T224150000Z_0002339","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Discovery","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_2... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260707T113149000Z_0002343","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251224T135625000Z_0002345","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Initial Access","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261018T141120000Z_0002347","ground_truth":{"detection_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Privilege Escalation","Impact"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261202T202229000Z_0002349","gr... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251225T041252000Z_0002351","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Credential Access","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_fin7_20261021T075539000Z_0002353","ground_truth":{"detect... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260930T194841000... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260828T004438000Z_0002357","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Discovery","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251102T194044000Z_0002359... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Initial Access","Collection"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260423T120429000Z_0002361","ground_truth":{"detec... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250506T024100000Z_0002363","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260619T101758000Z_0002365","ground_truth":{"det... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_fin7_20260629T064558000Z_0002367","ground_truth":{"detection_guidance":"Sigma rule for T15... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260213T022649000Z_0002369","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250209T073726000Z_0002371","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Impact","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250206T023542000Z_0002373","gr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20251130T065335000Z_0002375","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250615T081520000Z_0002377","ground_truth":{"detection_gu... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Discovery"],"technique_id":"T1531"},"event_id":"evt_lapsus_20261011T110356000Z_0002379","ground_truth":{"dete... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250929T140306000Z_0002381","ground_truth":{"detection_g... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260321T090122000Z_0002385","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250607T152204000Z_0... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt29_20250725T051607000Z_0002389","ground_truth":{"detection_guidance":"Sigma rule for T1570... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250710T030902000Z_0002391","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260311T041543000Z_0002393","... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251010T204150000Z_0002395","ground_truth":{"detection_guidance":"Sigma rule for T1059.0... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Impact"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260920T150344000Z_0002397","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Impact","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261004T174624000Z_0002399","ground_truth":{"detection_guidance":"Si... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.