text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Initial Access","Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260825T135053000Z_0013601","ground_truth":{"detection_guidan... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20261004T232158000Z_0013603","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Collection"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250822T07170... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Collection"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250104T0... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260515T144513000Z_0013609","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251110T152018000Z_0013611","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260708T211201000Z_0013613","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250615T225021000Z_0013615","ground_truth":{"detection_guidance":"Sigma rule for T1071... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Exfiltration","Impact"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250815T013531000Z_0013617","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260913T095946000Z_0013619","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261223T095552000Z_0013621","ground_truth":{"dete... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261218T221723000Z_0013623","ground_truth... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Initial Access","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt41_20251107T091154000Z_0013625","ground_trut... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260120T000041000Z_0013627","ground_truth":{"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250215T231815000Z_0013... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Discovery","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250928T1... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20260212T024930000Z_0013633","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250924T035226000Z_0013... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Collection","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250331T151400000Z_0013637",... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20250911T041216000Z_0013639","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Execution"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250610T054746000Z_0013641","gro... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260515T003336000Z_0013643","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261022T034622000Z_0013645","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_fin7_20251120T101109000Z_0013647","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260610T032043000Z_0013649","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260823T140636000Z_0013651","ground_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Command and Control","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261211T184021000Z_0013653","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260625T124902000Z_0013655","ground_truth":{"detecti... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Command and Control","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_lapsus_20261223T224044000Z_001... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260306T145959000Z_0013659","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Lateral Movement","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250923T115248000Z_0013661","ground_truth":{"detecti... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250603T005611000Z_0013663","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Discovery"],"technique_id":"T1531"},"event_id":"evt_fin7_20251202T091212000Z_0013665","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Persistence","Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261210T085030000Z_0013667","grou... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Privilege Escalation","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20261120T043011000Z_0013669","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_apt41_20260831T041921000Z_0013671","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Collection","Impact"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261126T102914000Z_0013673","ground_truth":... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt29_20251007T210007000Z_0013675","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261204T071315000Z_0013677","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250401T022323000Z_0013679","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Command and Control","Collection"],"technique_id":"T1570"},"event_id":"evt_apt29_20261103T042240000Z_0013681","ground_truth":{"detec... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251110T131756000Z_0013683","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260510T084033000Z_0013685","ground_truth":{"detection_guida... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250421T084835000Z_0013687","grou... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250209T155645000Z_0013689","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251118T060022... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Initial Access","Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260509T054036000... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Exfiltration","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250930T054703000Z_0013695","ground_truth":... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20251102T163507000Z_0013697","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Lateral Movement","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_fin7_20260317T212215000Z_0013699"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20261102T061257000Z_0013701","ground_truth":{"detection_g... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250529T095603000Z_0013703","ground_truth":{"detect... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Lateral Movement","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250922T063051000Z_0013705","ground_tr... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Privilege Escalation","Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261028T225... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260209T194553000Z_0013709","ground_truth":{"detection_guidance":"Sigma rule for T1021.... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250224T201528000Z_0013711","ground_truth":{"detection_guida... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Execution","Persistence"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260911T044000000Z_0013713","ground_truth":... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261201T234002000Z_0013715","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261230T190855000Z_0013717","ground_truth":{"detection_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260712T133750000Z_0013719","ground_truth":{"d... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Privilege Escalation","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251121T15495... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260810... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Persistence","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250731T212457000Z_0013725","g... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Credential Access","Execution"],"technique_id":"T1531"},"event_id":"evt_apt41_20251111T020955000Z_0013727","grou... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250712T185438000Z... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250921T225745000Z_0013731","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250913T173039000Z_0013733","ground_truth":{"detection_guida... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Collection","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspi... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251020T221418000Z_0013737","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260823T181926000Z_0013739","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Persistence","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250822T081944000Z_0013741","ground_truth":... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260427T022537000Z_0013743","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251120T213615000Z_0013745","ground_truth":{... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260817T171626000Z_0013747","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250814T215... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260803T005550000Z_0013751","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Impact","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260323T025406000Z_0013753","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_apt41_20260327T170109000Z_0013755","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_fin7_20260323T002444000Z_0013757","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260330T003500000Z_0013759","ground_truth":{"detection_guidance... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Lateral Movement","Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261129T183906000Z_0013761","ground_truth":{"de... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261219T084018000Z_0013763","ground_truth":{"detection_g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Command and Control","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260627T015142000Z_0013765","ground_t... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261231T003315000Z_0013767","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Persistence","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260715T055326000Z_0013769","ground_truth":{"dete... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Credential Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20251001T175719000Z_0013771","groun... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260328T055534000Z_001377... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250822T041013000Z_0013775","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250426T143156000Z_0013777","ground_truth":{"detection_guidan... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20261228T034841000Z_0013779","ground_truth":{"detection_guidance":"Sigma rule for T1021... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Execution","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20251117T014153000Z_0013781","ground_truth":{"detection_gu... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Lateral Movement","Impact"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20251113T145801000Z_0013783","ground_truth":{"detection... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Lateral Movement","Impact"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261214T2306210... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260723T132703000Z_0013787","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Impact","Execution"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260510T153231000Z_0013... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250209T233305000Z_0013791","ground_truth":{"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Exfiltration","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260329T233014000Z_0013793","ground_truth":{"detection... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250624T132150000Z_00... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Execution","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250101T101423000Z_0013797",... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Command and Control","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250115T103408000Z_... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.