text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260531T062815000Z_0006201","ground_tru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261129T071548000Z_0006203"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260306T170155000Z_0006205","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Command and Control","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250529T011739000Z_0006207","ground_truth":{"dete... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250209T213135... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260201T144401000Z_0006211","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Defense Evasion","Execution"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261224T213827000Z_000... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Impact"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260513T033134000Z_0006215","ground_truth":{"detecti... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251231T034114000Z_0006217","ground_t... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260618T154030000Z_0006219","ground_tru... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Lateral Movement","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20261114T074359000Z_0006221","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250921T024559000Z_0... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250420T020951000Z_0006225","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Privilege Escalation","Collection"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260405T012909000Z_0006227... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Collection","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250817T111337000Z_0006229",... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260219T062645000Z_0006231","ground_truth":{"detect... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250909T081726000Z_0006233","grou... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260806T051146000Z_0006235","ground_truth":{... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250708T135603000Z_0006237","ground_truth":{"detection_guidan... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Reconnaissance","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250805T162250000Z_0006239","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251102T225806000Z_0006241","groun... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250415T054107000Z_0006243","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Discovery","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251006T095532000Z_0006245","ground_truth":{"detection... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Credential Access","Execution"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260102T104556000Z_0006247",... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Exfiltration","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261009T152254000Z_0006249","ground_t... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Discovery"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250330T130920000Z_0006251","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Lateral Movement","Execution"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260221T102306000Z_0006253","ground_truth":{... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Execution","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260315T020501000Z_0006255","gro... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260215T053510000Z_0006257","ground_truth":{"detection_g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Impact"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260321T122442000Z_0006259","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20260503T132820000Z_0006261","ground_truth":{"dete... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20260516T170850000Z_0006263","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Exfiltration","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261030T013436000Z_0006265","... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Command and Control","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250819T102132000Z_0006267","ground_truth":{"detecti... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260419T205807000Z_0006269","groun... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251208T135356000Z_0006271","gr... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Exfiltration","Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261223T091715000Z_0006273","ground_truth"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Privilege Escalation","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260129T101544000Z_0006275","gro... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260524T064438000Z_0006277","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Discovery","Impact"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260828T121408000Z_0006279","ground... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250910T152833000Z_0006281","gr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20250528T232507000Z_0006283","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Command and Control","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_202609... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260925T163109000Z_0006287","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261101T170718000Z_0006289","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Collection"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260111T080653000Z_0006291","ground_truth":{"detec... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250714T204202000Z_0006293","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Impact","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20261230T13025... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260518T191408000Z_0006297","ground_truth":{"detection_gu... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250728T191150000Z_0006299","ground_truth":{"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20261122T022351000Z_0006301","ground_truth":{... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260903T073842000Z_0006303","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261110T082859000Z_0006305","ground_truth... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260101T060239000Z_0006307","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260917T040858000Z_0006309","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Impact"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260711T193659000Z_0006311","ground_truth"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250730T142209000Z_0006313"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250528T152241000Z_0006315","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Collection","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250414T233712000Z_0006317","ground_tru... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250701T051907000Z_0006319","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250117T013348000Z_0006321","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Collection","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250405T220328000Z_0006323","ground_truth"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261017T001605000Z_0006325","ground_truth":{"de... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250723T025741000Z_0006327","ground_truth":{"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250802T001307000Z_0006329","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Execution","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260109T... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260125T145357000Z_0006333","groun... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250308T220246000Z_0006335","g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Privilege Escalation","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250711T130500000Z_0006337","ground_trut... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250628T062343000Z_0006339","ground_truth":{"detection... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261107T215402000Z_0006341","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260206T181618000Z_0006343","ground_t... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Persistence","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20251002T212933000Z_000... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260105T140942000Z_0006347","ground_truth":{"detection... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Collection","Command and Control"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250926T000756000Z_0006349","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250605T161054000Z_0006351","ground_truth":{"dete... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Persistence","Execution"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Reconnaissance","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250325T021847000Z_0006355","ground_truth":{"detecti... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250908T233134000Z_0006357","grou... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Execution"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260314T045801000Z_0006359","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251116T212611000Z_0006361","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Credential Access","Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20260511T225916000Z_0006363","groun... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Credential Access","Execution"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_2026... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260927T094515000Z_0006367","ground_truth":{"detection_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251115T160246000Z_0006369","ground_truth":... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250527T083614000Z_0006371","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250620T115443000Z_0006... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Command and Control","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_must... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260318T055138000Z_0006377","ground_truth":... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250608T064100000Z_0006379","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Defense Evasion","Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250701T031857000Z_0006381","ground_truth":{"de... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Collection"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260617T174622000Z_0006383","ground_truth":{"detection_guida... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Execution","Impact"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260407T030904000Z_0006385","ground_truth":{"detection... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260711T0850340... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Collection","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251128T211715000Z_0006389","ground_truth":{"detection_g... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260614T085541000Z_0006391","groun... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250222T231426000Z_0006393","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Initial Access","Impact"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250908T08... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260117T182335000Z_0006397","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20251208T080739000Z_0006399","ground_truth":{"detection_guidance":"Sigma rule fo... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.