text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Collection","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250317T084421000Z_0015801","gro... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260719T190338000Z_0015803","ground_t... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Execution","Collection"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260805T213010000Z_0015805","ground_truth":{"de... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Reconnaissance","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250826T093220000Z_0... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260613T220446000Z_0015809","ground_truth":{"dete... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260211T180311000Z_0015811","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250630T173708000Z_0015813","ground_truth":{"detecti... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260410T040716000Z_0015815","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Lateral Movement","Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20261110T111715000Z_0015817","ground_truth":{"detection_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251029T050702000Z_0015819","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Impact","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260114T075530000Z_0015821","ground_truth":{"detection_g... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Lateral Movement","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260921T204151000Z_0015... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Collection","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260724T231234000Z_0015825","ground_truth":{"detect... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Discovery","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Collection","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260516T... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_fin7_20250623T031537000Z_0015831","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on s... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Initial Access","Collection"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260814T112603000Z_0015833","... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251127T033523000Z_0015835","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260921T223146000Z_0015837","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20260703T104903000Z_0015839","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250901T060525000Z_0015841","gro... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261106T021717000Z_0015843","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260826T180053000Z_0015845","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20261118T120247000Z_0015847","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on sr... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Credential Access","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250926T070945000Z_0015849","ground_truth":{"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Command and Control","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260102T233900000Z_0015851","groun... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261231T072727000Z_0015853","ground_truth":{"de... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Impact","Defense Evasion","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260116T154947000Z_0015855","ground_truth":{"detection_g... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251112T135701000Z_0015857","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260829T123822000Z_0015859","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Execution","Discovery","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260126T120520000Z_0015861","ground_truth":{"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Command and Control","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20251010T002401000Z_0015863","ground_truth":{"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Impact","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260318T143402000Z_0015865","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Command and Control","Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251219T114547000Z_0015867","ground_truth":{"detection_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250301T145735000Z_0015869","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251130T131405000Z_0015871","ground_tru... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260307T064403000Z_0015873","ground... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20251214T235946000Z_0015875","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260903T171631000Z_0015877","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join o... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261231T100637000Z_0015879","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250509T051754000Z_0015881","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251220T062127000Z_0015883","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250328T021828000Z_0015885","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250311T142433000Z_0015887","ground_truth":{"detection_guid... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250529T052534000Z_0015889","ground_truth":{"detection_g... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Collection","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250511T10362800... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Exfiltration","Collection"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260516T180110000Z_0015893","ground_tr... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260104T115847000Z_0015895","ground_trut... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Discovery","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251007T115412000Z_0015899","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250916T175341000Z_0015901","ground_truth":{"dete... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Execution","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250310T20373800... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260327T121223000Z_0015905","ground_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260214T192738000Z_0015907","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250208T191151000Z_0015909","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250326T060642000Z_0015911","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Execution"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260516T060203000Z_0015913","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Credential Access","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250419T043427000Z_001591... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Impact","Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251007T031515000Z_0015917","ground_trut... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260413T093205000Z_0015919","ground_truth":{"detecti... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260330T231446000Z_0015921","ground_truth":{"detection_guida... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260530T101655000Z_0015923","ground_truth":{"det... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260423T121559000Z_0015925","ground_truth":{"detect... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260313T080047000Z_0015927","ground_truth":{"detection_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251202T034933000Z_0015929","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Privilege Escalation","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250829T160406000Z_0015931","ground_t... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20251128T155350000Z_0015933","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Execution","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260117T111940000Z_0015935","ground_truth":{... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261027T140429000Z_0015937","ground_truth":{"detection... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Impact","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260224T003622000Z_0015939... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Exfiltration","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20261225T20060600... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_scattereds... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250607T080451000... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Exfiltration","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260119T115110000Z_0015947","ground_truth":{"detection_gui... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260429T083947000Z_0015949","ground_truth":{"dete... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261004T100352000Z_001595... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Execution"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20261204T154517000Z_0015953","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260813T184951000Z_0015955","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250116T122902000Z_0015957","ground_truth":{"detection_guidance":"Sigma rule for T109... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Reconnaissance","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260620T063... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250615T110745000Z_0015961","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Lateral Movement","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20261209T172906000Z_0015963",... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251013T013602000Z_0015965","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Reconnaissance","Impact"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260621T084423000Z_0015967","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260923T164041000Z_0015969","ground_truth":{"detection_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt29_20250127T031606000Z_0015971","ground_truth":{"detecti... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250521T183553000Z_0015973","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261219T043742000Z_0015975","ground_truth":{"detection... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Credential Access","Execution"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250911T085151000Z_0015977","ground_truth":{"detec... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250106T062446000Z_0015979","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Jo... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260701T004622000Z_0015981","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Credential Access","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250625T230024000Z_0015983","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_fin7_20260415T010504000Z_0015985","ground_truth":{"detection_guida... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250620T075534... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Collection"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250328T053451000Z_0015989","ground_truth":{"detec... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251211T012033000Z_0015991","ground_truth":{"detectio... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20261116T053408000Z_0015993","ground_truth":{"detection_guid... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Execution","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261005T023340000Z_0015995","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260608T003941000Z_0015997","ground_truth":{"detection_guidan... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250815T190617000Z_0015999","ground_truth":{"detection_guidance":"Sigma ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.