text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250916T203149000Z_0015001","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261017T005856000Z_0015003","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250515T083040000Z_0015005","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251003T215854000Z_0015007","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260525T214935000Z_0015009","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_apt29_20260309T100322000Z_0015011","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250107T221516... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Execution","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250510T032028000Z_0015015","ground_truth":... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Exfiltration","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250405T14573... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Initial Access","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250604T211029000Z_0015019","ground_truth":{"detecti... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Execution","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251014T145238000Z_0015021",... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260215T093848000Z_0015023",... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Initial Access","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250116T050749000Z_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260728T112953000Z_0015027","ground_truth":{"detection_guidance":"Sigma rule for T1059.... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Execution"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251230T214421000Z_0015029","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250510T075326000Z_0015031","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt29_20260901T012709000Z_0015033","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260831T062546000Z_0015035","ground_truth":{"detection_guidance... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Initial Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250427T144802000Z_0015037","ground_truth":{"detectio... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261205T210208000Z_0015039","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251106T194619000Z_0015041","gr... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Defense Evasion","Impact"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250608T125126000Z_001... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Execution","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260626T040347000Z_0015045","ground_truth":{"det... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250821T073913000Z_0015047","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260903T184314000Z_0015049","ground_tru... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260125T051237000Z_0015051","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261229T041406000Z_0015053","ground_truth":{"detect... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260709T120834000Z_0015055","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250321T202431000Z_0015057","ground_truth":{"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Execution","Impact"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260508T201722000Z_0015059","ground_truth":... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250508T111241000Z_0015061","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Defense Evasion","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260104T155231000Z_0015063","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260831T222430000Z_0015065","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20251008T144516000Z_0... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260601T093525000Z_0015069","ground_truth":{"det... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt41_20251102T082800000Z_0015071","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Collection","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250705T095653000Z_0015073","ground_trut... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Command and Control","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260320T113445000Z_0015075",... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260506T142639000Z_0015077","gro... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250805T111516000Z_0015079","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260215T183024000Z_0015081","ground_truth":{"detection_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Collection","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_scatteredsp... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250319T180557000Z_0015085","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Persistence","Impact"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260211T124302000Z_0015087","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_2025... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251205T033701000Z_0015091","ground_trut... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Collection","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251004T154524000Z_0015093","ground_truth":{"detectio... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250607T031939000Z_0015095","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250528T132356000Z_0015097","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20260914T163358000Z_0015099","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20251030T045859000Z_0015101","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251014T135637000Z_0015103","ground_truth":{"detection_guid... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Impact","Command and Control"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250331T012102000Z_0015105","ground... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Impact"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250423T025154000Z_0015107","ground_truth":{"dete... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261114T030134000Z_0015109","grou... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260212T032711000Z_0015111","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control","Execution","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250502T043012000Z_0015113","ground_truth":{"detectio... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260411T035947000Z_0015115","gro... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250824T150857000Z_0015117","ground_truth... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250405T012312000Z_0015119","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260527T132840000Z_0015121","ground_truth"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250120T213633000Z_0015123","ground_truth"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Discovery","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261123T2345150... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Defense Evasion","Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260306T153443000Z_0015127","ground_tru... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Execution"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250217T164408000... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Exfiltration","Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250330T185537000Z_0015131","ground_truth":{"detection_guida... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Exfiltration","Impact"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250514T133008000Z_0015133... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20251027T104706000Z_0015135","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260520T0951550... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Credential Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250808T204413000Z... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Collection","Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250928T164024000Z_0015141","ground_truth":{"detection_gui... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250120T204402000Z_0015143","ground_truth":{"dete... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251104T170324000Z_0015145","ground_truth":{"detecti... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251007T173010000Z_0015147","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260531T024247000Z_0015149","ground_truth"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_202608... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250424T073303000Z_0015153","ground_truth... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Credential Access","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261210T073958000Z_0015155","ground_truth... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Impact","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260204T141446000Z_0015157","ground_truth":{"detection_guida... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251209T162015000Z_0015159","ground_truth":{"detection... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250428T101124000Z_0015161","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Initial Access","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261110T050157000Z_0015163","ground_trut... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Reconnaissance","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250323T065653000Z_0015165","ground_truth":{"detecti... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250409T135100000Z_0015167","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260131T141929000Z_0015169","ground_truth":{"detection_guidance":"Sigma rule for T10... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20251129T204344000Z_0015171","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260601T132134000Z_0015173","ground_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250305T163755000Z_0015175","ground_truth":{"detection_guida... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250323T111312000Z_0015177","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Command and Control","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250830T102520000Z_0015179","ground_truth":{"det... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260419T140610000Z_0015181","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260718T104646000Z_0015183","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Execution","Discovery"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250414T211707000Z_0015185","ground_truth":{"d... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Reconnaissance","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250624T085058000... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260227T214418000Z_0015189","ground_truth":{"detection_guidance":"Sigma rule for T10... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250222T004634000Z_0015191","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Execution","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250425T071017000Z_0015193","grou... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Initial Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260204... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250228T044503000Z_0015197","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250604T094002000Z_0015199","ground_tr... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.