text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260510T044225000Z_0007201","ground_truth":{"detection_guidance":"Sigma rule for T15... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251020T002254000Z_0007203","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260418T204754000Z... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251202T001742000Z_0007207","ground_truth":{"detection_guida... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Impact","Execution"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260416T094525000Z_0007209","gr... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250610T093525000Z_0007211","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Collection"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250217T044057000Z_0007213","ground_truth":{"detection_gu... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250611T075857000Z_0007215","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261202T065545000Z_0007217","ground_truth":{"detection... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260822T204612000Z_0007219","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260402T042521000Z_000722... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_lapsus_20251015T215820000Z_0007223","ground_truth":{"detection_guidance":"Sigma rule for T1570 |... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt41_20260115T051849000Z_0007225","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt41_20250110T052830000Z_0007227","ground_truth":{"d... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260711T144354000Z_0007229","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250921T041841000Z_0007231","ground_truth":{"de... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Execution"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250518T020836000Z_0007233","ground_truth":{"d... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260821T184405000Z_0007235","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250714T080443000Z_0007237"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Discovery"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250823T035610000Z_0007239","ground_truth":{"det... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Defense Evasion","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260821T174027000Z_0007241","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250814T171547000Z_0007243","ground_tru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250708T165629000Z_000724... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Execution","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260410T154129000Z_000724... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Credential Access","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20261122T000448000Z_0007249","groun... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260330T020103000Z_0007251","ground_truth":{"detectio... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260209T205111000Z_0007253","ground_truth":{"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250917T134551000Z_0007255","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260517T185143000Z_0007257","ground_truth":{"detecti... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251107T195641000Z_0007259","ground_truth":... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260208T002048000Z_0007261","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Impact"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260718T075329000Z_0007263","ground_truth":{"detection... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence","Impact","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250525T053714000Z_0007265","ground_tr... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260715T120312000Z_0007267","ground_truth":{"dete... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250424T214422000Z_0007269","ground_truth":{"detection_guidance":"Sigma rule for T10... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Execution"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260215T194523000Z_0007271","ground_truth":{"det... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250217T030541000Z_0007273","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Initial Access","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250221T003418000Z_0007275","ground_truth":{... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Impact"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261006T190033000Z_0007277","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Exfiltration","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Command and Control","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250918T... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261101T013947000Z_0007283","ground_truth":{"detection_guidan... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20260615T093121000Z_0007285","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260227T100112000Z_0007287","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Reconnaissance","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250611T040006000Z_0007289","ground_truth":{"detecti... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260528T174149000Z_0007291","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261006T111754000Z_0007293","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Reconnaissance","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250417T163102000Z_0007295","ground_trut... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Command and Control","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_lapsus_20251207T082613000Z_0007297","ground_truth":{"det... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250725T121023000Z_0007299","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260916T041912000Z_0007301","ground_tru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Impact"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251031T173038000Z_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260514T225701000Z_0007305","ground_trut... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Impact","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20251018T... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Initial Access","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260302T155754000Z_0007... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260826T190524000Z_0007311","ground_t... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Reconnaissance","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260620T121422000Z_0007313","ground_truth":{"detect... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Lateral Movement","Command and Control"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260610T020511000Z_0007315","ground_truth":{"detectio... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250721T044257000Z_0007317","ground_... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250919T204345000Z_0007319","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261222T144531000Z_0007321","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250423T032325000Z_0007323","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260207T045803000Z_0007325","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250913T212106000Z_0007327","ground_truth":{"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Credential Access","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250618T192743... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260928T115800000Z_0007331","ground_truth":{"dete... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250506T071442000Z_0007333","ground_truth":{"detection_guid... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261223T114758000Z_0007335","ground_truth":{"de... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260228T161100000Z_0007337","ground_truth":{"detection_guid... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250403T064236000Z_0007339","gro... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Discovery","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250824T142621000Z_0007341"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261124T200614000Z_000734... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251125T173936000Z_0007345","ground_truth":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Collection"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261007T164106000Z_0007347","ground_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Reconnaissance","Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250406T061304000Z_0007349",... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Impact","Collection"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261015T010152000Z_0007351","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Exfiltration","Discovery"],"technique_id":"T1531"},"event_id":"evt_apt29_20250929T051036000Z_0007353","ground_trut... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_apt29_20260726T015931000Z_0007355","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260808T075938000Z_0007357","ground_truth":{"dete... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250608T034853000Z_0007359","ground_truth":{"detection_guidance":"Sigma rule for T1098... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Defense Evasion","Impact"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250701T1... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Initial Access","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260528T062510000Z_0007363","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250523T034338000Z_0007365","ground_truth":{"detecti... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260319T231427000Z_0007367","ground_truth":{"detection_guidan... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Command and Control","Discovery"],"technique_id":"T1531"},"event_id":"evt_apt41_20260110T155638000Z_0007369","ground_t... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Privilege Escalation","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_fin7_20260429T193842000Z_0007371","grou... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Defense Evasion","Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260908T0... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20261109T221137000Z_0007375","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Persistence"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250223T052318000Z_0007377","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Lateral Movement","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_volttyp... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Impact","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt29_20260213T095504000Z_0007381","ground_truth"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_fin7_20250724T104810000Z_0007383","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250716T182822000Z_0007385","ground_truth":{"detection_guidance":"Sigma rule for T1021... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250514T040656000Z_0007387","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261031T004453000Z_0007389","ground_truth":{"detection_guidance":"Sigma rule for T1059.... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260824T200150000Z_0007391","ground_truth":{"de... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Discovery","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250805T061019000Z_0007393","ground_truth":{"detec... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250720T142234000Z_0007395","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260107T053121000Z_0007397","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250716T054431000Z_0007399","ground_truth":{"detection_guidance... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.