text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260922T045849... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Execution"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20251003T021904000Z_0014603","gro... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251012T154827000Z_0014605","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Credential Access"],"technique_id":"T1570"},"event_id":"evt_fin7_20260707T232233000Z_0014607","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260317T161609000Z_0014609","ground_truth":{"detection_gui... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250728T193655000Z_0014611","ground_truth":{"detection_guid... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Persistence","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261201T01393900... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Execution","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250701T004840000Z_0014615",... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260508T085421000Z_0014617","ground_truth":{"d... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260901T201725000Z_0014619","ground_truth":{"detection_guidance":"Sigma rule for T1021.... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260131T054440000Z_0014621","ground_truth"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Persistence"],"technique_id":"T1570"},"event_id":"evt_apt29_20260928T062450000Z_0014623","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251230T161953000Z_0014625","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Initial Access","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250303T114422000Z_0014627","ground_truth... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20251104T152521000Z_0014629","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251006T112413000Z_0014631","ground_truth":{"detection_guidance":"Sigma rule for T10... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Impact","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_mustangpan... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Defense Evasion","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20261215T173810000Z_0014635","ground_truth":{"d... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Exfiltration","Impact"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250730T054850000Z_0014637","ground_truth... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Reconnaissance","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20261101T063019000Z_0014639","grou... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260106T104625000Z_0014641","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Credential Access","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20261115T135421000Z_0014643","ground_truth":{"d... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Collection"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261113T114208000Z_0014645","ground_truth":{"detec... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt29_20250125T093649000Z_0014647","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260907T034849000Z_0014649","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250529T104138000Z_0014651","ground_truth":{... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Privilege Escalation","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260119T... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250108T03040900... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20261204T042832000Z_0014657","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260310T193309000Z_0014659","ground_truth":{"d... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260315T201959000Z_0014661","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260322T122722000Z_0014663","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261022T063522000Z_0014665","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250108T000216000Z_0014667","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250612T092659000Z_0014669","ground_truth":{"detection_guidance":"Sigma rule for T1059.001... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Impact","Command and Control"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20261109T185659000Z_0... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251112T183908000Z_0014675","ground_truth":{"detec... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Command and Control","Impact"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250526T165035000Z_0014677","... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250313T210000000Z_0014679","... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_apt29_20260512T022754000Z_0014681","ground_truth":{"d... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution","Collection","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260217T064914000Z_0014683","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251123T080759000Z_0014685","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Discovery","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261027T163300000Z_0014687","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Command and Control","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250409T212005000Z_0014689","g... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250418T063850000Z_0014691","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Credential Access","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20261126T033015000Z_0014693","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Execution","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20251217T120218000Z_0014695","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260511T143110000Z_0014697","gr... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Impact"],"technique_id":"T1570"},"event_id":"evt_lapsus_20251208T004242000Z_0014699","ground_truth":{"detection_guidance":"Sigma rule for T1570... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250520T054605000Z_0014701","ground_truth":{"detection_g... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260406T223601000Z_0014703","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Exfiltration","Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251202T125243000Z_0014705","ground_truth":... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250901T074859000Z_0014707","ground_truth":{"detection_gui... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260211T152854000Z_0014709","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250220T01... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250313T014134000Z_0014713","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250705T200444000Z_0014715","ground_truth":{"detection_g... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20251001T095251000Z_0014717","ground_truth":{"detectio... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260706T045336000Z_0014719","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260513T172125000Z_0014721","ground_truth":{"detection_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260428T161133000Z_0014723","ground_truth":{"detection_guidance":"Sigma rule for T10... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Reconnaissance","Collection"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260416T090839000Z... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Execution","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261107T211418000Z_0014727","ground_trut... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250707T232055000Z_0014729","ground_truth":{"detection_gu... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Defense Evasion","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260912T060524000Z_0014731","ground_tru... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection"],"technique_id":"T1570"},"event_id":"evt_fin7_20251003T074904000Z_0014733","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_i... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250114T184057000Z_0014735","ground_truth":{"detection_guidan... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Credential Access","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250601T0741500... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Lateral Movement","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261106T210224000Z_0014739","ground_truth":{"detection_gu... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Defense Evasion","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250218T122819000Z... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Execution"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260712T220849000Z_0014743","groun... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250222T005947000Z_00... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260701T003816000Z_0014747","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 |... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Collection"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_2026062... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260521T120639000Z_0014751","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution","Credential Access","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260316T201219000Z_0014753","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250128T163746000Z_0014755","groun... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Credential Access","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_202... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250901T102529000Z_0014759","ground_tru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260924T120504000Z_0014761... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261212T070856000Z_0014763","ground_truth":{"detectio... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Command and Control","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt29_20260812T131447000Z_0014765","ground_truth":{"detectio... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Privilege Escalation","Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250124T125815000Z_00... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260420T230432000Z_0014769","ground_truth"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260606T234449000Z_0014771","ground_truth":{"detection_guidance":"Sigma rule for T10... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260705T172502000Z_0014773","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260609T213248000Z_0014775","ground_truth":{"detection_guidance":"Sigma rule for T1059.0... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Discovery","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Defense Evasion","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261130T211440000Z_0014779",... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261229T143405000Z_0014781","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250404T064310000Z_0014783","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261127T143032000Z_0014785","ground_truth":{"detection_gu... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Initial Access","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261224T... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260720T100049000Z_0014789","groun... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Impact"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260402T112749000Z_0014791","ground_truth":{"de... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Impact","Collection"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251107T084404000Z_0014793","ground_truth":{"de... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251014T205946000Z_0014795","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251231T123733000Z_00... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Privilege Escalation","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_fin7_20260210T034127000Z_0014799","ground_truth":{"detection_guidanc... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.