text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Impact","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261008T204034000Z_00030... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Lateral Movement","Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250703T120848000Z_000... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Reconnaissance","Persistence"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251218T232115000Z_0003005","ground_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20251231T123205000Z_0003007","groun... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260618T174253000Z_0003009","ground_truth... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260131T142538000Z_0003011","ground_truth":{"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260405T034016000Z_0003013","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Lateral Movement","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250205T064931000Z_0... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250411T103638000Z_0003017","ground_trut... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250220T131102000Z_0003019","ground... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Initial Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250606T132008000Z_0003021","ground_truth":{"dete... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Command and Control","Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260223T070538000Z_0003023","ground_truth":{"detec... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250530T131402000Z_0003025","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Impact","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250620T144948000Z_0003027","ground_truth":{"detection_gui... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260904T002315000Z_0003029","ground_tr... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Credential Access","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_apt41_20260326T161054000Z_0003031","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Reconnaissance","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251221T103839000Z_0003033","ground_truth":{"detection_guida... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Collection","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250420T230931000Z_0003035... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251215T032636000Z_0003037... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260420T093218000Z_0003039","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20260328T195627000Z_0003041","ground_truth":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20251204T154545000Z_0003043","gro... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Execution"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260224T1... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260917T012127000Z_0003047","ground_truth":{"detection_guidance":"Sigma rule for T1098.... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260529T173318000Z_0003049","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Defense Evasion","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260418T000101000Z_0003051","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251212T220524000Z_0003053","ground_truth":{"detection_guidance":"Sigma rule for T1098.0... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Lateral Movement","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261016T214906000Z_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Collection","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260817T094452000Z_0003057","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Impact"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260130T000016000Z_0003059","ground_truth":{"detection_guida... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Persistence","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_2025... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Initial Access","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_202610... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Credential Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250609T212951000Z_0003065","ground_truth":{"d... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261025T232313000Z_0003067","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Collection","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250314T000423000Z_0003069","gr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Defense Evasion","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260101T22222600... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Discovery","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260124T083137000... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250618T145410000Z_0003075","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260621T060145000Z_0003077","ground_truth":{"detection_guid... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260316T131629000Z_0003079","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Exfiltration","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250702T103407000Z_0003081","ground_truth":{"detection... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250706T022947000Z_0003083","ground_truth":{"detection... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Credential Access","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc484... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20251224T040803000Z_0003087","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20261108T110849000Z_0003089","ground_truth... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250519T03281500... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Collection"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261004T235231000Z_0003093","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250421T000456000Z_0003095","ground_truth":{"detection_guidance":"Sigma rule for T1071... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Execution","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250111T015732000Z_0003097","ground_truth":{"detection_gui... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250918T151141000Z_0003099","ground_truth":{"det... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251204T000053000Z_0003101","ground_truth":{"detection_guidan... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Privilege Escalation","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_unc4841_20261118T160225000Z_0003103","ground_truth":{"det... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250126T060341000Z_0003105","groun... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260901T065156000Z_0003107","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261226T235511000Z_0003109","ground_truth":{"detection_gu... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260531T220011000Z_0003111","ground_truth":{"detection... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Command and Control","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250914T033442000Z_0003113","ground_truth":{"detection... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Collection","Command and Control"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260405T010208000Z_0003115","ground_tr... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260921T023914000Z_0003117","ground_truth":{"detection_guida... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Reconnaissance","Collection"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260124T061651000Z_0003119","g... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Collection"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250922T093511000Z_0003121","ground_trut... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250131T052127000Z_0003123","ground_truth":{"detec... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Execution","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251101T025714000Z_00... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20261001T233743000Z_0003127","ground_truth":{"detection_guidance":"Sigma rule for T15... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Discovery","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_2025... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250309T093244000Z_0003131","ground_truth":{"detectio... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250715T121022000Z_0003133","g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250404T061757000Z_0003135","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Collection","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251122T160546000Z_000... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260413T032839000Z_0003139","ground_truth":{"detec... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261214T025205000Z_0003141","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250319T000042000Z_0003143","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260310T083835000Z_0003145","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution","Defense Evasion","Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260517T123155000Z_0003147","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260718T122554000Z_0003149","ground_truth":{"det... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Collection"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250106T010828000Z_0003151","ground_truth... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Exfiltration","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20261211T1510390... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261026T001414000Z_0003155","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260327T103209000Z_0003157","ground_truth":{"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260407T023433000Z_0003159","ground_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Reconnaissance","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251215T221141000Z_0003161","ground_truth":... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Command and Control","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250912T230744000... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250120T230500000Z_0003165","ground_truth":{"detection... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260506T162930000Z_0003167","ground_truth":{"detection_guidance":"Sigma rule for T1059.00... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Collection"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251015T051636000Z_0003169","ground_truth":{"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260626T003720000Z_0003171","ground_truth":{"detection_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250409T075407000Z_0003173","ground_truth":{"detection_guidance":"Sigma rule for T157... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Impact"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260323T000136000Z_0003175","ground_truth":{"detect... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Impact","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250317T154816000Z_0003177","ground_truth":{"detectio... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Discovery","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260310T082811000Z_0003179","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20261006T045838000Z_0003181"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260221T101316000Z_0003183","ground_truth":{"detecti... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250921T112149000Z_0003185","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250602T124318000Z_0003187","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260309T195956000Z_0003189","ground_tru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Lateral Movement","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260624T192756000Z_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260712T105204000Z_0003193","ground_truth":{"detect... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Defense Evasion","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260420T213245000Z_0003197","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20251106T122615000Z_0003199","ground_truth":{"detection_guidance":"Sigma... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.