text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260823T165717000Z_0018401","... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Credential Access","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250415T183018000Z_0018403","ground_truth":{... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261205T131037000Z_0018405","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20261015T151900000Z_0018407","... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Command and Control","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_apt29_20260117T144219000Z_0018409","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Reconnaissance","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250514T052237000Z_0018... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261026T170600000Z_0018413","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260303T064945000Z_0018415","ground_truth":{"det... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Lateral Movement","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250825T013217000Z_0018417","ground_truth":{"detecti... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260706T193520000Z_0018419","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251127T004022000Z_0018421","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Persistence","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260811T14241300... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact","Defense Evasion","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261013T104408000Z_0018425","ground_truth":{"detection_g... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260805T134848000Z_0018427","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Joi... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251222T215117000Z_0018429","ground_truth":{"dete... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260329T091009000Z_0018431","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Initial Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260722T085618000Z_0018433","ground_trut... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250811T144918000Z_0018435","ground_truth":... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260218T085822000Z_0018437","groun... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Collection","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250108T070501000Z_0018439","ground... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Initial Access","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260604T152022000Z_00184... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261106T062627000Z_0018443","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260802T043433000Z_0018445","ground_truth":{... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Command and Control","Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260922T180952000Z_0018449","ground_truth":{"detection_guida... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Persistence","Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20260613T122629000Z_0018451","ground_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Credential Access","Execution"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250421T220024000Z_001845... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260701T010023000Z_0018455","ground_truth":{"detect... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Defense Evasion","Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20260717T150956000Z_0018457","grou... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Impact","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250902T114649000Z_0018459","ground_truth":{"detection... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20260602T052431000Z_0018461","ground_truth":{"detection_guidance":"Sigma rule for T157... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Command and Control","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260405T110233000Z_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Discovery"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260213T003753000Z_0018465","ground_truth":{"detection_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260622T220148000Z_0018467","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250726T062251000Z_0018469","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250510T183032000Z_0018... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20261031T135225000Z_0018473","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | ... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20261104T163925000Z_001... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Impact","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250315T102956000Z_0018477","ground... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260528T020405000Z_0018479","ground_truth":... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250319T155612000Z_0018481","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Privilege Escalation","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"e... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_fin7_20250602T041729000Z_0018485","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260928T004823000Z_0018487","ground_truth... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260226T201751000Z_0018489","ground_truth":{"detection_guidance":"Sigma rule for T109... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20250720T233854000Z_0018491","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Persistence","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260809T153012000Z_0018493","gr... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Privilege Escalation","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260530T0444... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Collection"],"technique_id":"T1570"},"event_id":"evt_unc4841_20251116T081930000Z_0018497","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Exfiltration","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_202... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Persistence"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250710T215859000Z_0018501","ground_truth":{"detec... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250208T023045000Z_0018503","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Credential Access","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260508T000748000Z_001... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Command and Control","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoo... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20250808T180234000Z_0018509","ground_truth":{"de... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260126T204534000Z_0018511","ground_truth":{"detecti... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Command and Control","Collection"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250101T042546000Z_0018513","ground... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Reconnaissance","Collection"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260805... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251010T223157000Z_0018517","ground_tr... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260218T122350000Z_0018519","ground_truth":{"detection_gui... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Collection"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250604T105454000Z_0018521","ground_truth":{... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20261112T062657000Z_0018523","gr... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260919T171649000Z_0018525","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Jo... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250108T154215000Z_0018527","g... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Collection"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250804T220406000Z_0018529","ground_truth":{"detection_guidance... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250910T125313000Z_0018531","ground_truth":{"detection_gu... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Command and Control","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Credential Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250314T140017000Z_0018535","ground... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20261005T060914000Z_0018537",... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260817T030557000Z_0018539","ground_truth":{"detection_g... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250417T054726000Z_0018541","ground_truth":{"detection_guida... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250415T104411000Z_0018543","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260829T025053000Z_0018545","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Credential Access","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250510T205746000Z_0018547","ground_truth":{"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260616T212338000Z_0018... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250710T130900000Z_0018551","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251010T090746000Z_0018553","ground_truth... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250213T081934000Z_0018555","ground_truth":... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Command and Control","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260108T095822000Z_0018557","ground_truth":{"detecti... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261218T133919000Z_0018559","ground_truth"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Exfiltration","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260801T002... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Execution","Initial Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250530T215443000Z_0018563","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20251029T044332000Z_0018565","groun... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Initial Access","Execution"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260727T2... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250821T034326000Z_0018569","ground_truth":{"detection_guidan... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Execution","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261005T181... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access","Credential Access","Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260703T140839000Z_0018573","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20261110T145117000Z_0018575","g... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261028T083009000Z_0018577","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact","Reconnaissance","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251119T093443000Z_0018579","ground_truth":{"detection_guida... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control","Execution"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261031T102702000Z_0018581","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection"],"technique_id":"T1570"},"event_id":"evt_apt29_20260318T060143000Z_0018583","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join o... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_2... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_apt29_20250904T041017000Z_0018587","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250630T084116000Z_0018589","ground_tru... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250602T001413000Z_0018591","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Reconnaissance","Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261130T081314000Z_0018593","ground_truth":{"de... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Lateral Movement","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250427T050321000Z_0018595","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260125T073346000Z_0018597","ground_truth":{"detection_guidan... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260129T144948000Z_0018599","ground_truth":{"detection_guidance":"... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.