text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Privilege Escalation","Impact"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250406T022107000Z_0014001","ground_truth":{... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250407T045026000Z_0014003","ground_truth":{"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_fin7_20261011T022402000Z_0014005","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Credential Access","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261024T114207000Z_0014007","ground... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250707T201309000Z_0014009","g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260903T011613000Z_0014011","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Reconnaissance","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260811T222304000Z_0014015","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250109T145755000Z_0014017","ground_truth":{"detect... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260828T190622000Z_0014019","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261204T072256000Z_0014021","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20260924T230424000Z_0014023","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260116T134010000Z_0014025","ground_truth":{"de... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260117T123553000Z_0014027","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt29_20250220T065304000Z_0014029","ground_truth":{"detection_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251002T231020000Z_0014031","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250225T135151000Z_0014033","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Impact","Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250430T163229000Z_0014035","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Collection"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260609T152513000Z_0014037","ground_truth":{"d... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Impact"],"technique_id":"T1570"},"event_id":"evt_apt29_20251107T100528000Z_0014039","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Discovery","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260311T024855000Z_00140... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Persistence","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260317T135545000Z_0014043","ground_truth":{"detec... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260521T044751000Z_0014045","ground_truth":{"detection_g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260609T210427000Z_0014047","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Initial Access"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251013T183425000Z_0014049","ground_truth":{"dete... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Discovery","Execution"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260217T1803... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260318T194825000Z_0014053","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260707T105745000Z_0014055",... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Initial Access","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250207T163448000Z_0014057","ground_truth... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Exfiltration","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250126T231457000Z_0014059","ground_truth"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Collection","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260103T1134520... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250715T153942000Z_0014063","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Lateral Movement","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260428T053837000Z_0014065","ground_truth... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Persistence","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250618T054302000Z_0014067","ground_truth":{"detection_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250329T134307000Z_0014069","ground_trut... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250204T115604000Z_0014071","ground_truth":{"detect... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Privilege Escalation","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250721T085622000Z_0014073","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260403T223600000Z_0014075","ground_trut... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Credential Access","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260409T214304000Z_0014077","gro... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250214T031301000Z_0014079","ground_truth":{"detection_guida... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260730... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250124T071006000Z_0014083","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Initial Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260822T155115000Z_001... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Defense Evasion","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250713T034357000Z_0014087","grou... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260313T200055000Z_0014089","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251009T121828000Z_0014091","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250106T022018000Z_0014093","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Lateral Movement","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt41_20250122T192025000Z_0014095","g... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20261013T222421000Z_0014097","ground_truth":{"detecti... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260310T235534000Z_0014099","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Command and Control","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260514T144433000Z_0014101","ground_t... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260912T200631000Z_0014103","ground_truth":{... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Initial Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20250116T082830000Z_0014105","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Discovery","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250608T213013000Z_0014107","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Execution","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260927T125549000Z_0014109","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt41_20250716T195723000Z_0014111","ground_truth":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Execution"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261229T205019000Z_0014113","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260302T115338000Z_0014115","ground_truth":{"detectio... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261107T143805000Z_0014117","ground_truth":{"det... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261204T163557000Z_0014119","ground_truth":{"de... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Privilege Escalation","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_202612... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250226T070400000Z_0014123","ground_truth":{"detection_guida... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250224T000058000Z_0014125",... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261025T022214000Z_0014127","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20250119T173145000Z_0014129","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join o... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Lateral Movement","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261115T133432000Z_0014131","ground_truth":{"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250116T123420000Z_0014133","ground_t... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250620T062134000Z_0014135","ground_truth":{"detec... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250315T184530000Z_0014137","ground_truth":{"detection... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Reconnaissance","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251114T095704000Z_0014139","gro... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250729T194745000Z_0014141","ground_tr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Execution","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261219T145532000Z_0014143","ground_truth":{"de... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Reconnaissance","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260525T021442000Z_0014145","ground_truth":{"detection_guida... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Exfiltration","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261006T123413000Z_0014147","grou... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260313T050026000Z_0014149","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261118T083805000Z_0014151","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260830T015539000Z_0014153","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250516T211750000Z_0014155","ground_truth":{"detection_guidan... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250428T162142000Z_0014157","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Collection"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260515T013159000Z_0014159","ground_truth":{"detection... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Privilege Escalation","Impact"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261104T110112000Z_0014161","ground_tru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260406T073126000Z_0014163","ground_truth":{"detecti... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Execution","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260128T184238000Z_0014165","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260703T045300000Z_0014167","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250602T062836000Z_0014169","ground_truth":{"detection_guid... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261008T234506000Z_0014171","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Discovery","Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260404T155350000Z_0014173","ground_truth"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251110T132316000Z_0014175","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Reconnaissance","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260313T034955000Z_0014177... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact","Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260414T111641000Z_0014179","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Jo... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250113T200207000Z_0014181","ground_truth":{"detec... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Persistence","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260331T163651000Z_0014183","ground_truth":{"detectio... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261202T095209000Z_0014185","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Discovery","Impact"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261013T235600000Z_0014187","gro... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251008T153221000Z_0014189","ground_truth":{"detection... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250613T060159000Z_0014191","... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Credential Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251221T21200... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Command and Control","Execution"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260417T17232000... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260621T075503000Z_0014197","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Privilege Escalation","Impact"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260525T224557000Z_0014199","ground_truth":{"detection_guidance":"Sigm... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.