text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Execution"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260922T085513000Z_0014801","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260604T040211000Z_0014803","ground_truth":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Defense Evasion","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260909T123615000Z_0014805","ground... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260109T185348000Z_0014807","... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260209T230636000Z_0014809","ground_truth":{"d... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260601T074918000Z_0014811","ground_truth":{"detection_guid... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250402T060427000Z_0014813",... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Exfiltration","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250622T080834000Z_0014815","groun... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Execution"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260301T035837000Z_0014817","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20250918T230445000Z_0014819","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Collection","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250114T182346000Z_0014821","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Privilege Escalation","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250619T1422... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250728T030821000Z_0014825","ground_truth":{"detection_gu... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Impact","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260401T154938000Z_0014827","ground_truth":{"det... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Command and Control","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20251127... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251115T191228000Z_0014831","ground_truth":{"dete... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Impact"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250113T071813000Z_0014833","ground_tr... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Credential Access","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251218T165531000Z_0... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261028T062839000Z_0014837","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20251111T215904000Z_0014839","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 |... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Lateral Movement","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260205T232... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250221T213710000Z_0014843","ground_truth":{"detectio... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260108T055132000Z_0014845","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250814T233951000Z_0014847","ground_truth":{"detectio... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Persistence"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250626T042743000Z_0014849","ground_truth":{"detection_guidance":"Sigma rule for T15... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260930T194511000Z_0014851","ground_truth":{"detec... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Execution","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Lateral Movement","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260807T144346000Z_0014855","ground_truth":{"detect... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Lateral Movement","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260322T112253000Z_0014857","ground_truth":{"dete... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251109T022407000Z_0014859","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260703T152121000Z_0014861","gro... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250128T230101000Z_0014863","gro... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251223T223240000Z_0014865","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Impact"],"technique_id":"T1570"},"event_id":"evt_apt41_20260308T173121000Z_0014867","ground_truth":{"detection_guidance":"Sigma rule for T157... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260115T133216000Z_0014869","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20251215T143315000Z_0014871","ground_truth":{"detection_guidance":"Sigma rule for T1098.... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251016T194521000Z_0014873"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Exfiltration","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250312T024100000Z_001487... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260609T062339000Z_0014877","ground_truth":{"detection... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251120T161255000Z_0014879","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260111T002945000Z_0014881","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Collection"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250910T232105000Z_0014883","ground_truth":{"detection_guida... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Privilege Escalation","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260723T212740000Z_0014885","ground_truth":{"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Defense Evasion","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250224T192120000Z_0014887","ground_truth":{"det... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Impact"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250108T165908000Z_0014889","ground_tru... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250722T132840000Z_0014891","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Lateral Movement","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250424T... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250924T044915000Z_0014895","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260709T012826000Z_00... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260312T231643000Z_0014899","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261127T160347000Z_0014901","ground_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260912T201115000Z_0014903","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251116T171433000Z_0014905","ground... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Execution","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250630T045722000Z_0014909","ground... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Persistence","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261229T023254000Z_0014911","ground_trut... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260628T233753000Z_0... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250505T171524000Z_0014915","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Privilege Escalation","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20261203T023225000Z_00149... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251116T061452000Z_0014919","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260822T061823000Z_0014921","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Impact","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Credential Access","Initial Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260905T220559000Z_0014925","ground_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Lateral Movement","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250621T143300000Z_0014927","ground_t... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251116T130737000Z_0014929","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251117T081135000Z_0014931","ground_truth":{"detect... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Collection"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250217T135700000Z_0014933","ground_truth":{"detec... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260710T201032000Z... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_apt41_20250906T174734000Z_0014937","ground_truth"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260807T191716000Z_0014939","ground_tru... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261005T171617000Z_0014941","ground_truth":{"detection_gui... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250409T122244000Z_0014943","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Impact","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251104T222805000Z_0014945","ground_truth":{"detection_guida... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261116T163037000Z_0014947","groun... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251215T161001000Z_0014949","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260222T200939000Z_0014951","ground... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260807T165506000Z_0014953","ground_truth... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Defense Evasion","Discovery"],"technique_id":"T1531"},"event_id":"evt_apt41_20250811T142228000Z_0014955","ground_truth":{"detect... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Impact","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250322T094714000Z_00149... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Collection"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260623T112128000Z_0014959","ground_tr... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250824T215748000Z_0014961","ground_truth":{"detec... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Execution","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250902T213015000Z_001496... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260218T024322000Z_0014965","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250307T005824000Z_0014967","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Command and Control","Execution"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260521T21123300... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260611T215310000Z_0014971","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250613T115202000Z_0014973","ground_truth":{"detection... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260128T101617000Z_0014975","ground_truth... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Command and Control","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_apt41_20260410T024141000Z_0014977","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261108T024919000Z_0014979","ground_truth":{"det... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261004T013249000Z_0014981","ground_truth":{"detection_g... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Reconnaissance","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_2025... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Initial Access","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251226T163637000Z_0014985","ground_truth":{"de... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Collection","Command and Control"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260517T143515000Z_0014987","ground_truth":{"det... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250730T202204000Z_0014989","ground_truth":{"detection_gu... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260801T194954000Z_0014991","ground_truth"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260122T050214... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260807T105432000Z_0014995"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt41_20250821T082305000Z_0014997","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260919T141420000Z_0014999","ground_truth... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.