text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Credential Access","Discovery"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260328T031734000Z... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Defense Evasion","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251031T061019000Z_0002603","ground_tr... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Collection"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250502T061250000Z_00026... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250313T063515000Z_0002607","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250812T092723000Z_0002609","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250920T081218000Z_0002611","ground_truth"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250925T073538000Z_0002613... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250111T201357000Z_0002615","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260421T082212000Z_0002617","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Joi... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260615T013735000Z_0002619","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260610T192959000Z_0002621","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250830T090421000Z_0002623","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt29_20250325T022600000Z_0002625","ground_truth":{"detection_gui... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260202T185600000Z_0002627",... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260302T023742000Z_000... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250601T072759000Z_0002631","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250924T210005000Z_0002633","ground_truth":{"detection_guidance":"Sigma rule for T1021... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260807T051329000Z_0002635","ground_t... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Privilege Escalation","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_volttypho... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Lateral Movement","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_must... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250920T020402000Z_0002641","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260223T144448000Z_0002643","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250315T094846000Z_000264... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Lateral Movement","Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20250924T075510000Z_0002647","ground_truth"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260813T092607000Z_000264... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250525T004121000Z_0002651","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Collection"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20251111T170455000Z_000265... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Collection"],"technique_id":"T1531"},"event_id":"evt_apt41_20260705T162327000Z_0002655","ground_truth":{"detecti... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Collection","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250809T223923000Z_0002657","ground_trut... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Lateral Movement","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260110T015249000Z... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Collection","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251103T204313000Z_0002661","ground_truth":{"detection_gu... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Reconnaissance","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_202504... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20260211T210838000Z_0002665","ground_truth":{"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Lateral Movement","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260603T223057000Z_0002667","grou... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Privilege Escalation","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250603T095020000Z_0002669","gro... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Discovery","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260913T232955000Z_0002671","ground_tru... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250327T183159000Z_0002673","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261009T204834000Z_0002675","groun... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Lateral Movement","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260930T112554000Z_0002677","ground_truth":{... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260102T230124000Z_0002679","ground_truth":{"detection_guidance":"Sigma rule for T157... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260417T163338000Z_0002681","ground_truth":{"detection_guidan... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250113T230917000Z_0002683","ground_truth... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1570"},"event_id":"evt_fin7_20260825T173155000Z_0002685","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Command and Control"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251217T165907000Z_0002687","ground_truth":{"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Persistence","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_scatte... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Execution"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250407T05480... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Command and Control"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250208T170045000Z_0002693","ground_truth":{"detec... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260515T025243000Z_0002695","ground_truth":{"detection_gu... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Discovery","Execution"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260311T201323000Z_0002697","g... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Persistence","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260404T000257000Z_00... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Execution","Impact"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260907T063105000Z_0002701","ground_trut... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250617T102514000Z_0002703","ground_truth... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Reconnaissance","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250315T233611000Z_0002705","ground_truth":{"detect... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Credential Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt41_20250317T001145000Z_0002707","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Lateral Movement","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250219T185904000Z_0002709","ground_truth":{"detecti... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Lateral Movement","Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260222T160309000Z_0002711","ground_truth... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Execution","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261025T100117000Z_0002713","ground_truth":{"det... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access","Reconnaissance","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260419T224920000Z_0002715","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260221T083934000Z_0002717","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260511T013436000Z_0002719","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Impact","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261215T234946000Z_0002721"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Defense Evasion","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251005T185009000Z_0002723","ground_t... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261107T141625000Z_0002725","ground_truth":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Discovery"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250212T052931000Z_0002727","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260317T075620000Z_0002729","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Collection","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250301T134342000Z_0002731","ground... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260705T090239000Z_0002733","ground_truth":{"d... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20261006T084659000Z_0002735","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250125T143546000Z_00... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250225T035448000Z_0002739","ground_truth":{"de... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Command and Control","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260329T213450000Z_0002741","ground_truth":{"detection_guidan... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Reconnaissance","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_2025041... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Lateral Movement","Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_2026... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Credential Access","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250101T1230590... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261021T231612000Z_0002749","ground_truth":{"detection_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251116T195126000Z_0002751","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260927T210415000Z_0002753","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Impact","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250615T164430000Z_000... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260904T035214000Z_0002757","ground_truth":{"detec... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250726T125235000Z_0002759","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_2... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250308T070011000Z_0002763","ground_truth":{"detec... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Impact"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260510T230850000Z_0002765","ground_truth":{"detection_guidan... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Exfiltration","Collection"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260704T165539000Z_0002767","... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Reconnaissance","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250816T232702000Z_0002769","gr... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Command and Control","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250415T082753000Z_0002771","... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260325T225813000Z_0002773","ground_truth":{"dete... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Exfiltration","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt29_20260316T185941000Z_0002775","ground_truth... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Collection"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251123T032324000Z_0002777","ground_truth":{"detecti... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20251004T124623000Z_0002779","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20250110T203156000Z_0002781","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Initial Access","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250207T002514000Z_0002783","gr... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Defense Evasion","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251006T135942000Z_0002785","ground_truth":{"detecti... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Command and Control","Impact"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260306T023508000Z_0002787","ground_tru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Command and Control","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspide... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250409T134337000Z_0002791","ground_truth":{"de... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Lateral Movement","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250827T015834000Z_0002793","ground_truth":{"detec... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Defense Evasion","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20261008T164619000Z... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Initial Access","Persistence"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250805T085343000Z_0002797","ground_truth":{"detection_gu... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Credential Access","Collection"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.