text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250124T175833000Z_0017601","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Exfiltration","Persistence"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250109T073325000Z_0017603","ground_tr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Collection"],"technique_id":"T1570"},"event_id":"evt_apt29_20250527T103425000Z_0017605","ground_truth":{"detection_guidance":"Sigma rule for T157... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Defense Evasion","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251214T084253000Z_0017607","ground_t... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260612T0529... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Privilege Escalation","Initial Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260623T175638000Z_0017611","ground_truth... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261014T232234000Z_0017613","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Impact","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260210T050607000Z_0017615","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250827T125350000Z_0017617","ground_truth":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Collection","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251104T200436000Z_0017619","ground_truth":{"dete... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250403T044642000Z_0017621","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260331T212701000Z_0017623","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Impact"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20261120T074206000Z_0017625","ground_truth":{"de... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250511T035258000Z_0017627","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip w... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260922T214358000Z_0017629","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Command and Control","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt41_20250707T102834000Z_0017631"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Execution","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250811T212329000... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260520T084708000Z_0017635","ground_t... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250527T042953000Z_0017637","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Discovery","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250519T005552000Z_0017639","ground_truth":{"detecti... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250112T153050000Z_0017641","ground_truth":{"detection_guidance":"Sigma rule for T... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Credential Access","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260828T121633000Z_0017643","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Initial Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20251001T213304000Z_0017645","ground_truth... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Execution","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250520T005651000Z_0017647","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Persistence","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251108T105809000Z_0017649","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Impact","Credential Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260208T125417000Z_0017651","ground_truth":{"detecti... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250308T190623000Z_0017653","ground_truth":{"detection_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250508T123533000Z_0017655","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260124T041420000Z_0017657","ground_truth":{"det... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261220T161540000Z_0017659","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250509T000547000Z_0017661","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Credential Access","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250529T202906000Z_0017663","gro... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250623T212109000Z_0017665","ground_truth":{"detection_guidance... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Collection","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251124T222034000Z_0017667","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250518T224302000Z_0017669","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join o... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Initial Access","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260902T175004000Z_00176... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Collection","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261204T064852000Z_0017673","ground_tru... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250723T214851000Z_0017675","ground_truth":{"detection_g... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260914T110716000Z_0017677","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | J... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Command and Control","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250515T020157000Z_0017679","ground_truth":{"detecti... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Lateral Movement","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20261122T202553000Z_0017681","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250405T062012000Z_0017683","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Initial Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt29_20261003T061827000Z_0017685","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250701T022501000Z_0017687","ground_truth":{"detec... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260124T111900000Z_0017689","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260301T100521000Z_0017691","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Reconnaissance","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250921T050117000Z_0017... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_fin7_20260119T195620000Z_0017695","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact","Privilege Escalation","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250723T143816000Z_0017697","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20250906T221113000Z_0017699","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251113T200503000Z_0017701","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Execution","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260930T231057000Z_0017703","ground_truth":{"detectio... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Credential Access","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260711T123056000Z_0017705","... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Command and Control","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251125T004220000Z_001770... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260729T071840000Z_0017709","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Reconnaissance","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250822T020517000Z_0017711","ground_truth":{"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Execution","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260816T235650000Z_0017713","ground_truth":{"detection_gu... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260323T183548000Z_0017715","ground_truth":{"detection_guida... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Credential Access","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261206T064815000... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Impact"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250719T000426000Z_0017719","ground_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Defense Evasion","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20251203T051304000Z_0017721","g... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250604T174122000Z_0017723",... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251126T205303000Z_0017725","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260130T002449000Z_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250129T204616000Z_0017729","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250817T170453000Z_0017731","ground_truth":{"d... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Persistence","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250415T153255000Z_0017733","ground_truth":{"detectio... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250218T015741000Z_0017735","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260913T0... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260208T222414000Z_0017739","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260824T035037000Z_0017741","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260116T185519000Z_0017743","ground_truth... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251118T043332000Z_0017745","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20250107T021334000Z_0017747","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260222T173056000Z_0017749","ground_truth":{"detection_gu... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251207T032639000Z_0017751"... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Execution","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261102T081418000Z_0017753","ground_truth":{"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261018T200017000Z_0017755","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Privilege Escalation","Collection"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251011T023740000Z_0017757","gr... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Reconnaissance","Persistence"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260119T002618000Z_0017759","ground_truth":{"detection_g... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Reconnaissance","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250528T085414000Z_0017761",... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Credential Access","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250826T180616000Z_001... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250620T233144000Z_0017765","ground_truth":{"detection_gui... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250417T193154000Z_0017767","... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_fin7_20250324T213329000Z_0017769","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260809T062238000Z_0017771","ground_truth":{"detect... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250821T222616000Z_0017773","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261130T014254000Z_0017775","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Execution"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20261121T152554000... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Impact","Credential Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260810T010148000Z_0017779","grou... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Collection"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250730T063245000Z_0017781","ground_tr... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Collection","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260126T062953000Z_0017783","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260521T191605000Z_0017785","ground... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250523T213337000Z_0017787",... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260125T061931000Z_0017789","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Discovery","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261003T030031000Z_0017791",... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20251010T171733000Z_0017793","ground_truth":{"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250115T052324000Z_0017795","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Defense Evasion","Collection"],"technique_id":"T1531"},"event_id":"evt_apt41_20260820T063305000Z_0017797","gr... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Execution"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261021T140225000Z_0017799","ground_truth":{"detectio... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.