text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Lateral Movement","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20260604T200843000Z_0013001","ground_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261107T135234000Z_0013003","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Defense Evasion","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250406T085109000... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250612T185602000Z_0013007","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Joi... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Defense Evasion","Impact"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261130T095718000Z_0013009","... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250904T074453000Z_0013011","ground_truth":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20261221T144917000Z_00... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Credential Access","Impact"],"technique_id":"T1531"},"event_id":"evt_apt29_20260509T213038000Z_0013015","ground_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250605T025615000Z_0013017","ground_truth":{"d... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Execution"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260105T163418000Z_0013019","ground_truth":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Execution","Collection"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260702T053236000Z_0013021","g... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260607T234006000Z_0013023","ground_truth":{"detectio... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Discovery","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250711T141031000Z_0013025","ground_truth":{... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20261001T031516000Z_0013027","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Privilege Escalation","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250214T230645000Z_0013029","ground_truth":{"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261021T233216000Z_0013031"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260727T083534000Z_0013033","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Execution","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260425T032107000Z_0013035","ground_truth":{"detec... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Privilege Escalation","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20250908T093428000Z_0013037","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Command and Control","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250220T051234000Z_0013039... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250425T115031000Z_0013041","ground... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260810T212225000Z_0013043","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Impact"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250417T155328000Z_0013045","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250422T083311000Z_0013047","ground_truth":{"detection_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250504T122127000Z_0013049","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join o... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250111T015336000Z_0013051","ground_truth":{"de... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution","Defense Evasion","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260301T110117000Z_0013053","ground_tr... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260212T200556000Z_0013055","g... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access","Reconnaissance","Execution"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261229T081026000Z_0013057","ground_truth":{"d... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Privilege Escalation","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250917T005752... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250227T041022000Z_0013061","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250502T161031000Z_0013063","ground_truth":{"de... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Reconnaissance","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260307T223937000Z_0013065","ground_truth":{"det... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_fin7_20251029T162940000Z_0013067","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260212T150911000Z_0013069","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Collection","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261123T160039000Z_0013071","ground_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250101T164654000Z_0013073","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20251107T050807000Z_0013075","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Execution","Collection"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260731T044610000Z_0013077","ground_truth":{... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Impact","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20261001T224717000Z_0013079","ground_truth":{"det... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251221T230500000Z_0013081","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact","Discovery","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260201T133225000Z_0013083","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250128T032609000Z_0013085","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Command and Control","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260625T060857000Z_0013087",... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250501T190429000Z_0013089","ground_tru... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20261228T174126000Z_0013091","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Exfiltration","Credential Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261101T030205000Z... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Persistence","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251119T041738000Z_0013... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251218T202116000Z_0013097","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Credential Access","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261113T000026000Z_0013099","ground_truth":... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260208T191904000Z_0013101","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Joi... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Defense Evasion","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261222T092012000Z... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Execution"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250614T115904000Z_0013105"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Initial Access","Collection"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261227T084118000Z_0013107","ground_truth"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Credential Access","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251114T064140000Z_0013109","ground_truth":{"d... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20261031T123318000Z_0013111","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Impact"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261117T200744000Z_0013113","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250112T101649000Z_0013115","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250615T123320000Z_0013117","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Defense Evasion","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250728T193427000Z_0013119","ground_truth":{"detect... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Lateral Movement","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250105T232720000Z_0013121","ground_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Command and Control","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261104T191706000Z_0013123","gro... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250413T164255000Z_0013125","ground_truth":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20251010T032530000Z_0013127","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251009T190257000Z_0013129","ground_truth":{"detectio... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261009T062848000Z_0013131","ground_truth":{"detectio... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Execution"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250329T094307000Z_0013133","ground_trut... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250427T184707000Z_0013135","ground_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250529T201526000Z_0013137","ground_truth... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250922T113614000Z_0013139","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260807T194455000Z_0013141","ground_truth":{"detection_gu... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Exfiltration","Impact"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260710T223314000Z_0013143","ground_t... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261030T110105000Z_0013145","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Credential Access","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251121T174545000... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20250705T201211000Z_0013149","ground_truth":{"detection_guidance":"Sigma rule for T1570 |... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250423T025026000Z_0013151","ground_truth":{"detecti... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250916T125307000Z_0013153","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260220T183640000Z_0013155","ground_truth":{... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250331T115216000Z_0013157","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250611T103433000Z_0013159","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250924T022336000Z_0013161","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Reconnaissance","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261115T150111000Z_0013163","ground_truth":{"det... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260202T032420000Z_0013165","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_i... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Initial Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260924T033408000Z_0013167","ground_truth":{"detection_guid... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250307T184331000Z_0013169","ground_tr... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Execution","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260916T1003380... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251111T12424... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261026T115316000Z_0013175","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Collection"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260402T052728000Z_0013177","ground_truth":{"detection_gui... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Initial Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250201T035707000Z_0013179","ground_trut... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261113T180613000Z_0013181","ground_tr... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250418T094107000Z_0013183","ground_truth":{"detec... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260623T105629000Z_0013185","ground_truth":{"detection_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261022T141223000Z_0013187","ground_truth":{"detection_guidance":"Sigma rule for T1098.004... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250618T165724000Z_0013189","ground_truth":{"det... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20261211T173410000Z_0013191","ground_truth":{"detection_g... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Exfiltration","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260630T233343000Z_0013193","ground_truth":{"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Command and Control","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250727T133101000Z_0013195"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Impact","Persistence"],"technique_id":"T1570"},"event_id":"evt_apt29_20260827T182754000Z_0013197","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260730T010734000Z_0013199","ground_truth":{"... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.