text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260721T034704000Z_0011001","ground... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20261110T004128000Z_0011003","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250629T014325000Z_0011005","ground_truth":{"detection_guida... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261203T093514000Z_0011007","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260108T181726000Z_0011009","ground_truth":{"detection_guidance":"Sigma rule for T1098.0... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260515T171410000Z_0011011","ground_truth":{"detection_gui... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250812T154450000Z_0011013","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250815T051302000Z_0011015","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20261016T150104000Z_0011017","ground_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250415T193145000Z_0011019","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Credential Access","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260627T072247000Z_0011021","ground_truth"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Impact","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261127T223754000Z_0011023","ground_truth":{"detection_guid... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Exfiltration","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260522T114503000Z_0011025","ground_truth":{"detection_g... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Collection","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251109T182618000Z_0011027","ground_t... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Collection","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260409T193832000Z_0011029","ground_truth":{"d... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261025T170851000Z_0011031","ground_truth":{"detect... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250520T020226000Z_0011033","grou... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250215T133053000Z_0011035","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260909T031256000Z_0011037","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260703T050003000Z_0011039","ground_truth":{"de... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_2025... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250427T094406000Z_0011043","ground... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250315T124318000Z_0011045","ground_truth":{"de... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261103T110011000Z_0011047","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260918T064225000Z_0011049","ground_truth":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Command and Control","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260819T133112000Z_0011051","ground_truth":{"d... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261103T042218000Z_0011053","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Initial Access","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250615T092240000Z_0011055","ground_tr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Credential Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251014T214246000Z_0011057","ground... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Initial Access","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261108T111126000Z_0011059","gr... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250915T054639000Z_0011061","ground_truth":{"detection_guidance":"Sigma rule for T10... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20260525T024109000Z_0011063","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access","Lateral Movement","Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260501T194102000Z_0011065","ground_truth":{"detection_guid... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261017T165458000Z_0011067","ground_truth":{"d... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260508T174804000Z_0011069","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Initial Access","Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260721T211... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250223T154043000Z_0011073","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Persistence","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260406T023747000Z_0011075","ground_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260410T133736000Z_0011077","groun... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260923T082359000Z_0011079","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Reconnaissance","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250228T134854000Z_0011081","ground_t... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Discovery","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260430T225023000Z_0011083","ground_truth":{"de... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Persistence","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260630T2225290... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Collection","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261130T002813000Z_0011087","ground_truth":{"d... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Collection"],"technique_id":"T1570"},"event_id":"evt_apt29_20251104T205200000Z_0011089","ground_truth":{"detection_guidance":"Sigma rule for T1570 ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Credential Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260807T221345000Z_0011091","... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261224T135433000Z_0011093","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_fin7_20250916T085823000Z_0011095","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Privilege Escalation","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250512T191900000Z_0011097","ground_truth":{"detection_guid... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250715T053808000Z_0011099","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Reconnaissance","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260129T10... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260818T214453000Z_0011103","ground_truth":{"detecti... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251229T102251000Z_0011105","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250122T134554000Z_001... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Initial Access","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250811T221826000Z_0011109","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Collection","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250816T195556000Z_0011111","ground_trut... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Command and Control","Discovery"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260820T142253000Z_0011113","ground_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Lateral Movement","Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250517T060302000Z_0011115","ground_truth":{"detection_gui... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Exfiltration","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20251024T095851000Z_0011117","ground_truth":{"de... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260528T182106000Z_0011119","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260601T095640000Z_0011121","ground_truth":{"detec... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260618T041137000Z_0011123","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250212T010902000Z_0011125... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260510T165315000Z_0011127","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250717T113149000Z_0011129","ground_truth":... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251128T211325000Z_0011131","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250411T210732000Z_0011133","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250307T231328000Z_0011135","g... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260920T221534000Z_001113... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260723T145037000Z_0011139","gr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Execution","Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261119T151302000Z_0011141","ground_truth":{"detection_guida... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Discovery"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260210T221820000Z_0011143","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260518T150359000Z_0011145","gro... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Initial Access","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261129T035201... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Exfiltration","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261129T042600000Z_0011149","ground_truth"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20261126T163211000Z_0011151","ground_trut... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Privilege Escalation","Collection"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260519T144933000Z_0011153","ground_truth":... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260111T195900000Z_0011155","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250912T104918000Z_0011157","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Execution","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260715T190440000Z_0011159","ground_t... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260613T032400000Z_0011161","ground_truth":{"detection_guidance":"Sigma rule for T1071.00... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Lateral Movement","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260117T023608000Z_0011163","g... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251126T063832000Z_0011165","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251216T001417000Z_0011167","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20250904T071359000Z_0011169","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250627T030656000Z_0011171","ground_truth":{"detection_guida... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Lateral Movement","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"ev... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260814T033359000Z_0011175","ground_truth":{"detection_g... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260521T043338000Z_0011177","ground_truth":{"d... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260909T173418000Z_0011179","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260109T133459000Z_0011181","ground_truth":{"detec... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260323T06153000... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Collection","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_202511... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Defense Evasion","Persistence"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250404T081257000Z_0011187","ground_trut... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Defense Evasion","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251127T154452000Z_0011189","ground_truth":{"detecti... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Credential Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_scat... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250112T120607000Z_0011193","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join o... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251109T004845000Z_0011195","groun... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250915T212057000Z_0011197","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251004T064221000... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.