text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Initial Access","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt29_20250517T172011000Z_0018601","gro... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250724T053818000Z_0018603","ground_truth":{"detection_g... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260324T094014000Z_00... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260417T081556000Z_0018607"... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Execution","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260710T070550000Z_0018609","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260109T025345000Z_0018611","ground_tru... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Collection"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260106T100335000Z_0018613","ground_truth":{"detectio... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact","Exfiltration","Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20251207T170629000Z_0018615","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20251014T092033000Z_0018617","ground_t... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250430T192851000Z_0018619","ground_truth":{"detect... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250918T113516000Z_0018... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Initial Access","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250829T222742000Z_0018623","g... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Discovery"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250623T021608000Z_0018625","ground_truth":{"detect... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Credential Access","Impact"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260305T091420000Z_0018627","ground_truth":{"dete... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260409T035748000Z_0018629","ground_truth":{"detection_guidance":"Sigma rule for T1098... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250918T121046000Z_0018631","groun... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20260104T103557000Z_0018633","ground_truth":{"detection_guidance":"Sigma rule for T1570 | J... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Impact","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250712T091342000Z_0018635","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260316T012208000Z_0018637","ground_truth":{"detect... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261212T215518000Z_0018639","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250806T193105000Z_0018641","ground_truth":{"detec... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251018T083424000Z_0018643","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251223T093525000Z_0018645","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260302T093150000Z_0018649","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260128T152853000Z_0018651","ground_truth":{"de... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260214T174752000Z_0018653","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260813T132939000Z_0018655","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Defense Evasion","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250305T132222000Z_0018657... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261209T040438000Z_0018659","ground_truth":{"detection_guidance... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260708T173854000Z_0018661","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Collection","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_202... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250220T054759000Z_0018665","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260423T075006000Z_0018667","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260105T195546000Z... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access","Persistence","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260215T020939000Z_0018671","ground_truth":{"detection_... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260227T142121000Z_0018673","groun... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Initial Access","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251130T0332240... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Collection"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260904T073606000Z_0018677","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Lateral Movement","Impact"],"technique_id":"T1570"},"event_id":"evt_fin7_20260216T055232000Z_0018679","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Command and Control","Collection"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250218T040303000Z_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260215T095046000Z_0018683","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Impact","Collection"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_202509... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261024T175442000Z_0018687","ground_truth":{"detection_guidance":"Sigma rule for T1021.006... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Reconnaissance","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260127T211446000Z_001... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250422T034741000Z_0018691","ground_trut... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Privilege Escalation","Execution"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250324T213419000Z_0018693","ground_truth":{"detect... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Collection"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260210T212619000Z_0018695","ground_truth":{"detection_gui... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251206T115925000Z_0018697","ground_truth":{"d... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Collection"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250915T155908000Z_0018699","ground_truth":{"dete... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250509T152727000Z_0018701","ground_truth":{"detection_guidance":"Sigma rule for T1... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Collection","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260709T1... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250526T064426000Z_0018705","groun... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt41_20250428T093837000Z_0018707","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20251213T101010000Z_0018709","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Privilege Escalation","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251023T2111... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence","Discovery","Impact"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260527T214557000Z_0018713","ground_truth":{"detection_guidance":"Sigma rule for T105... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20251019T044222000Z_0018715","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Impact","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250306T153152000Z_0018717","ground_truth":{"dete... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261126T010933000Z_0018719","ground_truth":{"detection_guidance":"Sigma rule for T10... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Credential Access","Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260930T073043000Z_0018721","ground_truth":{"d... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Privilege Escalation","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261211T123935000Z_001... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Command and Control","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261229T070649... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260426T063029000Z_0018727","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260605T182416000Z_0018729","ground_truth":{"detection_guidance":"Sigma ru... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250202T074640000Z_0018731","ground_trut... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Reconnaissance","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20261210T202005000Z_0018733","ground_tr... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250714T102153000Z_0018735","ground_truth... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250208T000848000Z_001873... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250831T063051000Z_0018739","ground_... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250213T024244000Z_0018741","ground_truth":{"detection_... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt29_20261204T155255000Z_0018743","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260818T230813000Z_0018745","ground_truth":... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Command and Control","Impact"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260109T045226000Z_0018747","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Command and Control","Initial Access"],"technique_id":"T1484.001"},"event_id":... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Credential Access","Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250126T170403000Z_0018751","ground_truth"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Collection","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20261225T0753... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250804T135501000Z_0018755","ground_t... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250727T192518000Z_0018757","ground_t... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20251130T174608000Z_0018759","ground_truth":{"d... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260806T101133000Z_0018761","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260820T090459000Z_0018763","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260618T182437000Z_0018765","ground_truth":{"detection_guidance":"Sigma rule for T1071... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Exfiltration","Impact"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260327T200151000Z_0018767","ground_truth":{"d... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20261121T050039000Z_0018769","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250825T054234000Z_0018771","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Collection"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250122T113526000Z_0018773","ground_truth":{"detection_gu... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261112T102025000Z_0018775","ground_truth":{"de... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Privilege Escalation","Impact"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250718T202815000Z_0018777","ground_tr... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Initial Access","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260325T092719000... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Initial Access","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250419T131617000Z_0018781","g... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250923T175513000Z_0018783","ground_truth":{"d... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261020T103939000Z_0018785","ground_truth":{"d... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250524T153811000Z_0018787","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Defense Evasion","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261118T024650000Z_0018789","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250829T154842000Z_0018791","ground_truth":{"detection_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260512T094708000Z_0018793","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260729T085714000Z_0018795","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Privilege Escalation","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250925T045731000Z_0018797","ground_trut... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20251104T163323000Z_0018799","ground_truth":{"detection_guidance":"Si... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.