text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Collection","Impact"],"technique_id":"T1570"},"event_id":"evt_apt29_20260127T071002000Z_0015601","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260226T210902000Z_0... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250529T175352000Z_0015605","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | J... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250624T2321160... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260625T080344000Z_0015609","ground_truth":{"detection_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260101T210425000Z_0015611","ground_truth"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Defense Evasion","Impact"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250225T072506000Z_0015613... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Initial Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250412T133316000... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261218T135621000Z_0015617","ground_truth":{"det... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Defense Evasion","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261101T184919000Z_0015619","... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Initial Access","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250922T195826000Z_0015621","groun... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260329T122646000Z_0015623","ground_truth":{"detec... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Exfiltration","Initial Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261220T102909000Z_0015625","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260530T064913000Z_0015... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250505T235954000Z_0015629","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251115T21243... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20260521T222028000Z_0015633","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251105T054435000Z_0015635","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250820T120649000Z_0015637","ground_truth":{"detectio... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20250605T114412000Z_0015639","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260113T154445000... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20261203T061825000Z_0015643","ground_tr... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Credential Access","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260816T184402000Z_0015645","ground_t... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260825T002003000Z_0015647","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260214T161212000Z_0015649","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250413T073257000Z_0015651","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Discovery","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250220T033214000Z_0015653","ground... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250226T221250000Z_0015655","ground_truth":{"detec... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260224T043027000Z_0015657","ground_truth":{"detec... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Discovery","Persistence"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260828T213001000Z_0015659","ground... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260514T105809000Z_0015661","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261029T155435000Z_0015663","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250228T151955000Z_0015665","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260618T101855000Z_0015667","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 |... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251212T133617000Z_0015669","ground_truth":{"dete... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260803T142025000Z_0015671","ground_truth":{"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260717T133036000Z_0015673","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Impact"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250216T0620... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260602T215901000Z_0015677","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261110T053936000Z_0015679","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250707T225530000Z_0015681","ground_truth":{"detection_... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Privilege Escalation","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261205T103751000Z_0015683","ground_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_apt41_20250115T195456000Z_0015685","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip w... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250418T023807000Z_0015687","ground_truth":{"detection_guidance":"Sigma rule for T1098... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Defense Evasion","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261120T20... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261027T200446000Z_0015691... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250420T070317000Z_0015693","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Initial Access","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251018T074100000Z_0015695","ground_truth":{"de... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260629T110956000Z_0015697","ground_trut... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Defense Evasion","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260811T123022000Z_0015699","ground_truth":{"detec... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260427T234407000Z_0015701","grou... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250305T143817000Z_0015703","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251217T173346000Z_0015705",... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Initial Access","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250212T150309000Z_0015707","ground_trut... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Exfiltration","Collection"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260415T10423... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Execution","Impact"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260107... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250212T094634000Z_0015713","ground_trut... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Privilege Escalation","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260829T225448000Z_0015715","ground_truth"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Discovery","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250214T070958... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Execution","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250123T213436000Z_0015719",... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt29_20261003T014919000Z_0015721","ground_truth":{"detecti... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260915T233351000Z_0015723","ground_truth":{"detectio... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260226T095123000Z_0015725","ground_t... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Lateral Movement","Impact"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260821T235551000Z_0015727","ground_t... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Privilege Escalation","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250423T081... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Lateral Movement","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20251211T173752000Z_00... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Reconnaissance","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250923T022331000Z_0015733","ground_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Persistence","Execution"],"technique_id":"T1570"},"event_id":"evt_fin7_20260504T015729000Z_0015735","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Defense Evasion","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20250119T055137000Z_0015739","ground_truth":{"detection... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260904T185934000Z_0015741","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260504T154237000Z_0015743","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250617T063548000Z_0015745","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250317T135614000Z_0015747","gro... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Reconnaissance","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20260927T010648000Z_0015749","gro... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251113T155612000Z_0015751","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260815T002338000Z_0015753","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250212T032513000Z_0015755","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260502T222120000Z_0015757","ground_truth":{"detection_... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251227T163219000Z_0015759","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Execution"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260116T042954000Z_0015761","ground_truth"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260828T113622000Z_0015763","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260624T115831000Z_0015765","ground_truth"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260808T015157000Z_0015767","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250111T181320000Z_0015769","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250509T121058000Z_0015771","ground_truth":{"detec... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20260927T132221000Z_0015773","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Lateral Movement","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251020T221434000Z_0015775","ground_truth... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250512T210524000Z_0015777","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250203T111234000Z_0015779","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251125T000659000Z_0015781","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Privilege Escalation","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261020T02591400... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260719T015232000Z_0015785","ground_truth":{"de... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260308T060403000Z_0015... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251113T035219000Z_0015789","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260910T211928000... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection","Defense Evasion","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260208T155607000Z_0015793","ground_truth":{"dete... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251104T080533000Z_0015795","ground_truth":{"detection_guidance":"Sigma rule for T1098.... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250118T055433000Z_0015797","ground_truth":{"detection_guida... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact","Execution"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250710T035707000Z_0015799","ground_truth":{"detection_guidance":"S... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.