text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250822T073239000Z_0007401","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260121T094048000Z_0007403","ground_truth":{"detection_gui... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250725T174632000Z_0007405","gr... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261122T132450000Z_0007407","ground_truth":{"detection_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20260821T164428000Z_0007409","ground_truth":{"detection... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control","Reconnaissance","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260417T115147000Z_0007411","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20251223T201003000Z_0007413","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Impact","Collection"],"technique_id":"T1570"},"event_id":"evt_unc4841_20251113T121752000Z_0007415","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Exfiltration","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Execution","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260729T124728000Z_0007419","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Defense Evasion","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_sca... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Execution","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260119T133319000Z_0007423","ground_truth":{"detect... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250129T160611000Z_0007425","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt41_20250125T214100000Z_0007427","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Privilege Escalation","Credential Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250510T162835000Z_000742... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250821T092153000Z_0007431","ground_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260912T152155000Z_0007433","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Execution"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260729T200955000Z_0007435","ground_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Impact"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250301T190158000Z_0007437","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Impact"],"technique_id":"T1531"},"event_id":"evt_fin7_20260609T034413000Z_0007439","ground_truth":{"detection_guidance... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261010T104518000Z_0007441","ground_truth":{"detect... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250921T062746000Z_0007443","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Defense Evasion","Persistence"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250727T082653000Z_0007445","ground_trut... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260112T104728000Z_0007447","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260518T130848000Z_0007449","ground_trut... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250902T052849000Z_000... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250413T094054000Z_0007453","ground_truth":{"detection_guid... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261025T065750000Z_0007455","ground_truth":{"detection... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250619T141245000Z_0007457","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Collection","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260110T171910000Z_000745... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Impact","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261003T084206000Z_0007461","ground_truth":{"detection_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260604T083524000Z_0007463","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Command and Control","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_s... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260624T214813000Z_0007467","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250208T190754000Z_0007... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250417T044710000Z_0007471","ground_truth":{"detec... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20261031T065729000Z_0007473","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on sr... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Credential Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260908T093631000Z_0007475","ground_truth":{"detection_g... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250815T153039000Z_0007477","ground_truth":{"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Privilege Escalation","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20251226T112132000Z_0007479","ground_truth":{"detection_guida... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250724T083043000Z_0007481","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Initial Access","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260118T193549000Z_000748... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260801T174847000Z_0007485","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Defense Evasion","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250518T125717000Z_0007487","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Impact","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260531T023001000Z_0007489","ground_truth":{"det... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Execution"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20251222T18... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Persistence","Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20250508T093552000Z_0007493","ground_truth":{"d... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261012T090735000Z_0007495","ground_truth":{"detection_guidance... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Lateral Movement","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260605T041413000Z_0007497","ground_truth":{"dete... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20251006T140600000Z_0007499","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Initial Access","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_fin7_20251211T181038000Z_0007501","grou... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_fin7_20250910T114734000Z_0007503","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Command and Control","Execution"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260404T020239000Z_0... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251108T041254000Z_0007507","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Execution","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260630T232849000Z_0007509","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251210T063233000Z_0007511","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251108T004716000Z_0007513","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Credential Access","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20260513T035259000Z_0007515","gr... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Collection","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251130T143827000Z_0007517","ground_truth":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260623T063033000Z_0007519","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251206T230506000Z_0007521","ground_truth":{"detection_gui... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Initial Access","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250423T171738000Z_0007523","ground_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250107T063806000Z... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250201T094304000Z_0007527","ground_t... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250724T044803000Z_000... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Execution","Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20261020T062652000Z_0007531","ground_truth":{"detection_guidan... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20250916T203509000Z_0007533","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Defense Evasion","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250324T160521000Z_0007535","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250207T234935000Z_0007537","ground_truth":{"detection... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260212T114154000Z_0007539","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251127T034133000Z_0007541","ground_truth":{"detection_guidance":"Sigma rule for T109... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260726T213256000Z_0007543","ground_truth":{"de... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251016T132658000Z_0007545","ground_truth":{"detection_guidance":"Sigma rule for T1071... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260610T080151000Z_0007547","ground_truth":{"d... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Execution"],"technique_id":"T1531"},"event_id":"evt_fin7_20260502T012542000Z_0007549","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250326T045118000Z_0007551","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261119T152136000Z_0007553","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Initial Access","Collection"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260521T203234000Z_0007555","ground_truth":{"detection... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260926T115009000Z_0007557","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on sr... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Execution"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250515T115248000Z_0007559","ground_truth":{"detec... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250221T013212000Z_0007561","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260909T194236000Z_0007563","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Execution"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260610T081540000Z_0007565","ground_truth":... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Lateral Movement","Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260115T154420000Z_0007567","ground_truth"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Collection","Persistence"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250116T120102000Z_0007569","ground... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Persistence","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261121T072807000Z_00075... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Persistence","Collection"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20261122T090248000Z_0007573","ground_tr... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250524T023058000Z_0007575","ground_truth":{"detection_g... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260207T123032000Z_0007577","ground_t... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250429T171042000Z_0007579","ground_truth":{"detection... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250217T091233000... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260521T024527000Z_0007583","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260930T012011000Z_0007585","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251213T063659000Z_0007587","ground_truth":{"detectio... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260330T011634000Z_0007589","ground_truth"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261029T133454000Z_0007591","ground_truth":{"dete... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250811T045332000Z_0007593","ground_truth":{"detection_guidance":"Sigma rule for T10... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Command and Control","Persistence"],"technique_id":"T1570"},"event_id":"evt_fin7_20260803T080807000Z_0007595","ground_truth":{"detection_guidan... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Collection"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261104T121401000Z_0007597","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Impact","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260225T002859000Z_000759... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.