text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250913T070821000Z_0011201","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260129T195150000Z_0011203","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251217T122340000Z_001... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260721T015744000Z_0011207","ground_truth":{"detection_guidance":"Sigma rule for T102... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251010T190137000Z_0011209","ground_truth"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Defense Evasion","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250311T050220000Z_0011211","ground_truth":... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Execution","Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261205T225654000Z_00112... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250529T211657000Z_0011215","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251016T145739000Z_0011217","ground_truth":{"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Defense Evasion","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260707T051008000Z_001... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260803T090153000Z_0011221","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Collection"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260425T132313000Z_0011223","g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Credential Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261206T032553000Z_0011225"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250201T120848000Z_0011227","ground_truth":{"detection_guidance":"Sigma rule for T1098... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260714T011616000Z_0011229","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250331T165730000Z_0011231","ground_truth":{"de... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261203T120624000Z_0011233","ground_truth":{"detection_guidance":"Sigma rule for T1021.... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250922T191212000Z_0011235","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260629T013057000Z_0011237","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Privilege Escalation","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261007T081055000Z_0011239","gro... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260823T110731000Z_0011241","ground_truth":{"detection_gu... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Collection","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260728T072239000Z_0011243"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Impact"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260313T183602000Z_0011245","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251208T025114000Z_0011247","ground_truth":{"de... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20251123T005930000Z_0011249","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250113T064706000Z_0011... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Command and Control","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260815T224833000Z_0011253","ground_truth":{"detecti... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Collection"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260427T195721000Z_0011255","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Reconnaissance","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250919T220954000Z_0011257","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260129T221522000Z_0011259","g... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250317T103709000Z_0011261","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20260814T032907000Z_0011263","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Persistence","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_scatter... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250203T163033000Z_0011267","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20251016T175913000Z_0011269","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261220T102736000Z_0011271","ground_truth"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250103T235302000Z_0011273","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250911T171153000Z_0... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260611T2258... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251009T145806000Z_0011279","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260604T061053000Z_0011281","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260427T071013000Z_0011283","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250302T103412000Z_0011285","ground_truth":{"detectio... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251117T035958000Z_0011287","ground_truth":{... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250925T005136000Z_0011289","ground_truth":{"detectio... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250205T185142000Z_0011291","ground_tr... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251130T042739000Z_0011293","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250729T101137000Z_00... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250812T212944000Z_0011297","ground_truth":{... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260927T165712000... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Exfiltration","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250403T081948000Z_00... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260609T125936000Z_0011303","ground_truth":{"detect... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Execution","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260210T044205000Z_0011305","ground_truth":{"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251106T050643000Z_0011307","ground_tr... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Exfiltration","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260920T122345000Z_0011309","groun... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260829T195846000Z_0011311","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Impact","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250425T120009000Z_0011313","ground_t... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250902T070619000Z_0011315","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | J... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Execution"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261105T105511000Z_0011317","ground_truth":{"detection_guid... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Execution"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250526T112729000Z_0011319","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251121T081631000Z_0011321","ground_truth":{"detect... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20251029T131954000Z_0011323","ground_truth":{"detection_guida... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261121T215242000Z_0011325","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Impact"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250824T094619000Z_0011327","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260923T160203000Z_0011329","ground_truth":{"detection... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260610T1733570... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection","Exfiltration","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250821T055544000Z_0011333","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20261202T001240000Z_0011335","ground_truth":{"detection_guidance":"Sigma rule for T15... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20251009T170140000Z_0011337","ground_truth":{"dete... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Discovery","Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251007T193213000Z_0011339","ground_truth":{"detection_guid... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Execution"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20261027T091018000Z_0011341","ground_truth":{"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Command and Control","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250706T062023000Z_0011343","ground_truth":{... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250219T031703000Z_0011345","ground_truth":{"d... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260122T171834000Z_0011347","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Collection","Execution"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260409T063319000Z_0011349","ground_trut... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260315T232420000Z_00... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250129T184327000Z_0011353","ground_truth":{"detection_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20261129T183514000Z_0011355","ground_truth":{"detection_gu... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20260202T225149000Z_0011357","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250725T130735000Z_0011359","ground_truth":{"dete... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Lateral Movement","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_202... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250701T142145000Z_0011363","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Reconnaissance","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260916T0... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260222T202423000Z_0011367","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Impact"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251012T020803000Z_0011369","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260630T005509000Z_0011371","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Command and Control","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260206T031709000Z_0011373... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20251125T023050000Z_0011375","ground_truth":{"de... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260402T194405000Z_0011377","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Exfiltration","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260326T1... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_unc4841_20261118T133737000Z_0011381","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250615T034858000Z_0011383","gro... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Command and Control","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260604T023304000Z_0011385","ground_truth":... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Impact"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260209T034020000Z_0011387","ground_truth":{"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251009T225931000Z_0011389","ground_tru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Defense Evasion","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Exfiltration","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Collection"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260828T023904000Z_0011395","ground_truth":{"detection_... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260113T015739000Z_0011397","ground_truth":{"detecti... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250225T055850000Z_0011399","ground_truth":{"detection_guidance":"Sigma ru... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.