text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260406T160341000Z_0018801","groun... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Initial Access","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251107T101918000Z_0018803","ground_truth":{"detection... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251028T013539000Z_0018805","ground_truth":{"detection... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Privilege Escalation","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20251008T221955000... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250814T084254000Z_0018809","gro... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt41_20260120T234154000Z_0018811","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Credential Access","Collection"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261010T134827000Z_0018813","ground_truth":{"dete... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260527T095019000Z_0018815","ground_truth":{"detection_guidance":"S... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261031T061842000Z_0018817","ground_truth":{"detection_... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260918T053258000Z_0018819","ground_truth":{"detection_guid... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Persistence","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260505T232255000Z_0018821","gro... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251024T231014000Z_0018823","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Persistence","Command and Control"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251204T170600000Z_0018825","... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Exfiltration","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250425T191712000Z_0018... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Defense Evasion","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260208T214829000Z_0018829","ground_truth":{"dete... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Discovery","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250616T060852000Z_0018831","groun... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250720T144351000Z_0018833","ground_... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260827T070750000Z_0018835","ground_truth":{"detec... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Exfiltration","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251016T080225000Z_0018837","ground_truth":{"detect... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260525T145728000Z_0018839","ground_truth":{"det... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260113T102807000Z_0018841","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250410T055606000Z_0018843","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Execution","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260206T171605000Z_0018845","ground... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261126T214929000Z_0018847","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250105T093930000Z_0018849","ground_truth":{"detection_guida... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260314T181451000Z_0018851","ground... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261207T190951000Z_0018853","ground_truth":{"detection_guidance":"Sigma rule for T109... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20251002T144928000Z_0018855","ground... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Persistence","Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261227T003111000Z_0018857","ground_truth":{"detection_guidan... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260828T190737000Z_0018859","ground_tru... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260310T161923000Z_0018861","ground_truth":{"detection_guidance":"Sigma rule for T1071.0... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251124T001553000Z_0018863","ground_truth":{"dete... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Lateral Movement","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250710T195341000Z_0018865","ground_truth":{"d... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260612T021940000Z_0018867","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Exfiltration","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260704T094516000Z_0018869","ground_trut... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_fin7_20260603T054205000Z_0018871","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251111T194819000Z_0018873","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_fin7_20260517T055413000Z_0018875","ground_truth":{"detection_guidan... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Collection","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251014T082039000Z_0018877","ground_truth":{"detection_g... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260519T211730000Z_0... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Privilege Escalation","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260212T025235000Z_0018881","ground_truth":{"detection_gui... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Discovery","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260331T062807000Z_0018883","ground_truth":{"detection_gui... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250323T191851000Z_0018885","ground_truth":{"detection_guidance":"Sigma rule for T1071.... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260407T074827000Z_0018887","gro... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261109T215156000Z_0018889","ground_truth... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20250511T002809000Z_0018891","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260105T000651000Z_0018893","ground_truth":{"detection_gui... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Impact"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250209T211210000Z_0018895","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Defense Evasion","Execution"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260504T105340000Z_0018897","ground_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_fin7_20260315T062022000Z_0018899","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_2025... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Impact","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20260606T014128000Z_0018905","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250901T164547000Z_0018907","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250709T043557000Z_0018909","ground... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Collection","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250108T131610000Z_00... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250212T202420000Z_0018913","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Execution"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250125T192317000Z_0018915","ground_truth":{"d... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Privilege Escalation","Discovery"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260401T082450000Z_0018917","ground_truth":{"dete... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_fin7_20251208T102655000Z_0018919","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250704T231136000Z_0018921","ground_truth":{"de... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260104T001153000Z_0018923","ground_tru... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Command and Control","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250509T133030000Z_0018925","ground_truth":{"detection_g... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251102T201249000Z_0018927","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250518T115926000Z_0018929","ground_truth":{"detection_g... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Credential Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261118T234849000Z_0018931","ground_trut... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251016T181259000Z_0018933","ground... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260825T210833000Z_0018935","ground_truth":{"detection_guidance... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261204T171314000Z_0018937","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Credential Access","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt41_20250306T000118000Z_0018939",... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260124T173826000Z_0018941","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260923T233228000Z_0018943","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | J... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection"],"technique_id":"T1570"},"event_id":"evt_fin7_20260809T123754000Z_0018945","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on s... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Initial Access","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260123T041835000Z_0018947","ground_truth":{"detectio... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Execution"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20261112T121056000Z_0018949","g... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260311T011416000Z_0018951","ground_truth":{"detection_guidance":"Sigma rule for T1059.... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260412T054810000Z_0018953","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260411T123550000Z_0018955","ground_truth":{"detectio... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Persistence","Initial Access"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260927T044243000Z_0018957","gro... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251103T043725000Z_0018959","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251108T104908000Z_0018961","ground_truth":{"detection_gu... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260309T114434000Z_0018963","ground_t... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260305T031920000Z_0018965","g... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260220T174635000Z_0018967","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260506T032434000Z_0018969","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261118T232628000Z_0018971","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Exfiltration","Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260920T031038000Z_0018973","ground_truth":{"d... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt41_20261101T042718000Z_0018975","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Defense Evasion","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250613T134017000Z_0018977","grou... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Execution"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250706T075239000Z_0018979","ground_truth":{"detection_guidance"... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251029T135040000Z_0018981","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250712T205222000Z_0018983","ground_truth":{"detection_g... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Privilege Escalation","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260412T023316000Z_0018985","ground_truth":{"detection_gu... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260624T130843000Z_0018987","ground_truth":{"detec... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Privilege Escalation","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_volttypho... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Command and Control","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261203T210... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Command and Control","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20251205T155136000Z_0018... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Impact"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251230T014438000Z_0018995","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251003T234435000Z_0018997","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261220T095821000Z_0018999","ground_tr... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.