text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251228T071551000Z_0017001","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250819T221726000Z_0017003","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260201T123938000Z_0017005","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250611T162430000Z_0017007","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260718T112146000Z_0017009","ground_truth":{... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Impact"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260901T154829000Z_0017011","ground_truth":{"det... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Discovery","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261008T004847000Z_0017013","ground_truth":{"detection_gu... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250211T195541000Z_0017015","ground_truth":{"detectio... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Defense Evasion","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251015T041330000Z... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250122T212039000Z_0017019","ground_truth":{... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260707T201901000Z_0017021","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Privilege Escalation","Collection"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250219T085319000Z_00... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250119T040239000Z_0017025","ground_truth":{"detectio... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261205T182956000Z_0017027","ground... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250406T145311000Z_0017029","ground_truth":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250422T043339000Z_0017031","ground_truth":{"detecti... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261120T211002000Z_0017033","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251224T231806000Z_0017035","ground_truth":{"detecti... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250114T062008000Z_0017037","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on s... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250328T224621000Z_0017039","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260429T005244000Z_0017041","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250303T042617000Z_0017043","grou... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Persistence","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260530T202213000Z_0017045","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261210T232336000Z_0017047","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250202T144123000Z_0017049","ground_truth":{"detectio... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250801T195051000Z_0017051","ground_truth":{"detection... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260926T114330000Z_0017053","g... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Discovery","Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250718T233... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260414T084859000Z_0017057","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250503T200729000Z_0017059","... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260902T222338000Z_0017061","ground_truth":{"detection_guida... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Collection","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260902T091932000Z_0017063","ground_truth":{"detection_gu... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Exfiltration","Impact"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250626T041723000Z_0017065","ground_truth":{"detection... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260204T093246000Z_0017067","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250309T151915000Z_0017069","ground_truth":{"detection_guidance... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Collection","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260209T011417000Z_0017071","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260325T214203000Z_0017073","ground_truth":... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260522T094950000Z_001707... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Lateral Movement","Initial Access"],"technique_id":"T1570"},"event_id":"evt_fin7_20261030T065030000Z_0017077","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20261214T161538000Z_0017079","ground_truth":{"det... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250710T053938000Z_0017081","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Command and Control","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt41_20260917T123944000Z_0017083","ground_truth":{"detection_gu... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260107T225307000Z_0017085","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250311T142549000Z_0017087","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Impact"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260120T172101000Z_0017089","ground_truth":{"de... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251113T221549000Z_0017091","ground_truth":{"detection_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Impact"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250630T211501000Z_0017093","ground_truth... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260411T224538000Z_0017095","ground_truth":{"dete... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260309T123633000Z_00170... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Impact"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251015T175050000Z_0017099","ground_truth":{"detection_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution","Persistence","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260112T013830000Z_0017101","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Reconnaissance","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260207T023248000Z_0017103","ground_trut... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Exfiltration","Execution"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250407T232932000Z_0017105","ground_truth":{"detectio... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt41_20250516T044932000Z_0017107","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260303T053452000Z_0017109","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250813T074413000Z_0017111","ground_truth":{"detection_... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250701T010525000Z_0017113","ground_truth":{"detection_gu... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250409T122553000Z_0017115","ground_truth... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control","Privilege Escalation","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260827T050414000Z_0017117","ground_t... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260703T203007000Z_0017119","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Collection","Execution"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260317T134852000Z_0017121","ground_truth":{"dete... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20261025T171539000Z_0017123","ground_truth":{"detection_gui... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Reconnaissance","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251015T113320000Z_0017125","ground_truth":{"detection_gu... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Credential Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250827T160330000Z_0017127","ground_truth":{"det... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Reconnaissance","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260930T... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261004T075305000Z_0017131","ground_t... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250316T093504000Z_0017133","ground_tru... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260618T154545000Z_0017135","ground_tru... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Reconnaissance","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250530T213007000Z_0017137","ground_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260320T011913000Z_0017139","ground_trut... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260517T172430000Z_0017141","ground_t... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250213T140740000Z_0017143","ground... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260921T211454000Z_0017145","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Execution","Collection"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250601T132129000Z_001714... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250316T193622000Z_00171... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260918T182620000Z_0017151","ground_truth":{"detection_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250605T151617000Z_0017153","ground_truth":{"detection_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250118T045828000Z_0017155","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250903T121111000Z_0017157","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261229T192536000Z_0017159","ground_truth":{"detection_guidance":"Sigma rule for T156... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260220T101730000Z_0017161"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20251009T104057000Z_0017... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260725T182025000Z_0017165","groun... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250408T014336000Z_0017167","ground_truth":{"detec... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250511T062238000Z_0017169","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260114T142621000Z_0017171","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260618T081000000Z_0017173","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Exfiltration","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260819T141910000Z_0017175","ground_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Reconnaissance","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250712T110002000Z_0017177","grou... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Execution"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260905T061404000Z_0017179","ground_truth":{"detect... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt29_20260805T150903000Z_0017181","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260326T055100000Z_0017183","ground_tru... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20260923T223835000Z_0017185","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_apt41_20250228T094031000Z_0017187","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251217T145603000Z_0017189","ground_truth":{"detec... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Defense Evasion","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260601T102449000Z_0017191",... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250127T040015000Z_0017193","ground_truth":{"dete... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250508T143125000Z_0017195","groun... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260717T185255000Z_0017197","ground_truth":{"detection_gu... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection","Defense Evasion","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250111T055757000Z_0017199","ground_truth":{"... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.