text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Command and Control","Execution"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250509T103554000Z_0013401","ground_truth":{"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250218T233404000Z_0013403","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Command and Control","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260530T083329000Z_0013405","ground_trut... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Command and Control","Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250107T151803000Z_0013407... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250713T030253000Z_001340... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20251220T055331000Z_0013411","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250228T213256000Z_001341... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Persistence","Initial Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251112T001453000Z_0013415","ground_truth... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Reconnaissance","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251204T174447000Z_0013417","ground_truth":{"detection_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250226T144430000Z_0013419","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250818T172857000Z_0013421","ground_trut... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250715T034333000Z_0013423","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Persistence","Impact"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260920T090133000Z_0013425","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250728T071032000Z_0013427","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Privilege Escalation","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260902T135313000... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Command and Control","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260402T065457000Z_0013431","g... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Execution","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_2... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250806T003507000Z_0013435","ground_trut... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261011T192840000Z_0013437","ground_truth":{"detection_g... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250415T005252000Z_0013... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Impact","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt29_20260425T024515000Z_0013441","ground_truth":{"det... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Impact","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251218T093532000Z_0013443","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Credential Access","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250617T222117000Z_0013445","ground_truth":{"det... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Persistence","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250402T170745000Z_0013447","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Collection"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250618T213500000Z_0013449","ground_truth":{"det... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261204T221652000Z_0013451","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Defense Evasion","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250311T220723000Z_0013453","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250826T103018000Z_0013455","g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251111T081108000Z_0013457","ground_truth":{"detecti... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Reconnaissance","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250206T143853000Z_0013459","ground_trut... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260715T162332000Z_0013461","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250721T094249000Z_0013463","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Discovery","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260420T041409000Z_0013465","ground_t... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Collection"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250908T090930000Z_0013467","ground_truth":{"d... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Execution"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250507T091356000Z_0013469","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Discovery","Execution"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250414T222125000Z_0013471","ground_truth":{"detection_guidan... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Persistence","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251206T001444000Z_0013473","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Credential Access","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250830T031240000Z_0013475","ground_truth":{"detect... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_apt41_20251010T121802000Z_0013477","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Discovery","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251021T093352000Z_0013479","ground_truth":{"detection_guidan... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Discovery"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260625T084021000Z_0013481","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251215T174232000Z_0013483","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Privilege Escalation","Collection"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250406T042439000Z_0... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250726T170611000Z_0013487","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Execution","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20251029T231535000Z_0013489","ground_truth":... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250714T153... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250615T142527000Z_0013493","grou... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260425T132445000Z_0013495","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Command and Control","Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260211T104342000Z_0013497","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Discovery","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250629T111259000Z_0013499","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Exfiltration","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260512T005109000Z_0013501","grou... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Persistence","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260523T124755000Z_0013503","ground_truth":{"d... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251227T081757000Z_0013505","ground_tr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260316T174729000Z_0013507","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Reconnaissance","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250916T115042000Z_0013509","ground_truth":{"detec... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250804T124804000Z_0013511","ground_truth":{"detection_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260705T193033000Z_0013513","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Impact","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260720T172634000Z_0013515","g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Privilege Escalation","Execution"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250707T205831000Z_0013517","ground_truth":{"detectio... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260322T150528... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250416T133501000Z_0013521","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250516T024500000Z_0013523","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Collection","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261113T163836000Z_0013525","gro... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250607T104900000Z_0013527","ground_truth":{"detectio... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260507T045342000Z_0013529","ground_truth":{"detection_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Initial Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_202605... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Discovery","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260508T101510000Z_0013533","gr... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260121T224956000Z_0013535","ground_truth":{"detec... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250928T125654000Z_0013537","ground_tru... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250112T004515000Z_0013539","ground_truth":{"det... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260211T034932000Z_0013541","ground_truth":{"det... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251106T045135000Z_0013543","gr... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20251231T034313000Z_0013545","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Privilege Escalation","Initial Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250521T155706000Z_0013547","g... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Collection","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260906T020224000Z_0013549","ground_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250731T054524000Z_0013551","ground_truth":{... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20260506T075117000Z_0013553","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Exfiltration","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20251106T1630560... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence","Discovery","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250904T203611000Z_0013557","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Collection","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20250605T160605000Z_0013559","ground_truth":{"detection_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Lateral Movement","Initial Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260620T015501000Z_0013561","gro... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260917T213436000Z_0013563","ground_truth":{"detection_gu... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251103T093950000Z_0013565","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260808T195827000Z_0013567","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260125T065839000Z_0013569","ground_truth":{"detection_g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Collection","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260920T060115000Z_0013571","ground_truth":{"detection_... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Command and Control"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250912T065824000Z_0013573","ground_truth":{"detection_guida... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260422T192336000Z_0013575","gr... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Initial Access","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260528T044907000Z_0013577","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260425T060115000Z_0013579","gro... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260325T203815000Z_0013581","ground_truth":{"detection_guidance... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Impact"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250629T151116000Z_0013583","ground_trut... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_fin7_20250308T072748000Z_0013585","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250627T002902000Z_0013587","ground_truth":{"detection_guida... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Privilege Escalation","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Privilege Escalation","Execution"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250706T000337000Z_0... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt41_20250202T030804000Z_0013593","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250510T023615000Z_0013595","ground... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251007T013428000Z_0013597","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261129T182345000Z_0013599","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.