text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt41_20250914T110559000Z_0004601","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Execution","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250906T230455000Z... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Defense Evasion","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260522T162504000Z_0004605","grou... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Privilege Escalation","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250719T113302000Z_000460... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt41_20261122T054710000Z_0004609","ground_truth":{"detection_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt41_20260310T230737000Z_0004611","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250504T002400000Z_0004613","ground_truth":{"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Execution","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251220T13461300... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250618T143728000Z_0004617","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Impact","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250903T154329000Z_0004619","ground_truth":{"detectio... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260110T200333000Z_0004621","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Impact","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260402T015109000Z_0004623... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250706T141624000Z_0004625","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Execution","Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250708T032355000Z_0004627","ground_truth":{"detection_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Command and Control","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260626T065331000Z_0004629","ground_tr... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260918T064755000Z_0004631","ground_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250619T090957000Z_0004633","ground_truth":{"detection_guidance":"Sigma rule for T1570... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250608T102940000Z_0004635","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Impact","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261030T145950000Z_0... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260308T094203000Z_0004639","ground_truth":{"detection_guidan... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt41_20260313T004216000Z_0004641","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Reconnaissance","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260413T165217000Z_0004643","... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20261103T115036000Z_0... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Impact","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260604T071936000Z_0004647","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Collection"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260609T230523000Z_0004649","ground_truth":{"detec... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260315T005857000Z_0004651","ground_truth":{"de... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260729T110108000Z_0004653","grou... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250602T210324000Z_0004655",... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261022T042502000Z_0004657","ground_truth":{"detection_gui... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250707T082347000Z_0004659","ground_truth":{"detection_guida... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20250423T051348000Z_0004661","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260901T020636000Z_0004663","ground_truth":{"detection_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250810T162924000Z_0004665","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Credential Access","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250607T172622000Z_0004667","ground_truth":{"de... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250927T182447000Z_0004669","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250726T130749000Z_0004671","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Defense Evasion","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250609T110105000Z_0004673","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260515T040159000Z_0004675","ground_truth":{"detectio... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20261202T150628000Z_0004677",... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Reconnaissance","Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260521T223836000Z_0004679","ground_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Reconnaissance","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260727T165123000Z_0004681","... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Initial Access","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260617T234325000Z_0004683",... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Defense Evasion","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20260819T094750000Z_0004685","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Defense Evasion","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_202... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Credential Access","Initial Access"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260809T200311000Z_00046... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20260921T111332000Z_0004691","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261130T055144000Z_0004693","ground_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20261226T153714000Z_0004695","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Reconnaissance","Execution"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261203T11375... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250221T215615000Z_0004699","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Collection"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250730T164834000Z_0004701","ground_truth":{"detecti... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260729T162043000Z_0004703","ground_truth":{"detection_g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250903T152859000Z_0004705","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261107T212559000Z_0004707","ground_truth":{"detection_guidance... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261125T144556000Z_0004709","ground_truth":{"detection_gui... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250322T221644000Z_0004711","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Credential Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_202611... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution","Exfiltration","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251220T173402000Z_0004715","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260517T162849000Z_0004717","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Defense Evasion","Collection"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260427T164... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Discovery","Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250614T07381500... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250424T085219000Z_0004723","ground_truth":{"detection_gui... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Lateral Movement","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250209T103547000Z_... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250129T140845000Z_0004727","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Collection"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260626... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260325T025436000Z_0004731","ground_truth":{"detection_g... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Discovery","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250813T123918000Z_000... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Privilege Escalation","Persistence"],"technique_id":"T1570"},"event_id":"evt_fin7_20260214T185338000Z_0004735","ground_truth":{"detection... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261012T191153000Z_0004737","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261213T211839000Z_0004739","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261019T205242000Z_0004741","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261210T123611000Z_0004743","ground_truth":{"detectio... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251211T144401000Z_0004745","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261012T055624000Z_0004747","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Collection","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250531T233602000Z_0004749","gr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250116T184231000Z_0004751","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250213T185818000Z_0004753","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250525T150012000Z_0004755","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261026T181945000Z_0004757","ground_truth":{"detection_gui... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250122T194406000Z_0004759","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251222T154538000Z_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260602T120231000Z_0004763","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260226T111049000Z_0004765","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact","Privilege Escalation","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261016T103748000Z_0004767","ground_truth":{"detection_gu... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260501T122256000Z_0004769","ground_truth"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260328T142729000Z_0004771","ground_truth":{"detec... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Lateral Movement","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Impact","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250411T060309000Z_0004775","ground_truth":{"de... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260724T0... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260413T011532000Z_0004779","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260216T141058000Z_0004781","ground_truth":{"detection_g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250710T131012000Z_0004783","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Impact","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260420T024809000Z_0004785","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260729T01... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250303T182602000Z_0004789","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260429T020900000Z_0004791","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Initial Access","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt41_20261023T220046000Z_0004793","ground_truth":... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Credential Access","Impact"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_202507... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Initial Access","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260509T133959000Z_0004797","ground_truth":{"detection_guid... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250207T140225000Z_0004799","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.