text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250527T044815000Z_0019401","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Initial Access","Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250218T225424000Z_0019403","... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Collection"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260101T112831000Z_0019405","ground_truth":{"detection_gui... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Command and Control","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_202... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Privilege Escalation","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250607T1539590... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Initial Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Execution","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261209T053052000Z_0019413","ground_truth":{"detection_gu... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_fin7_20260319T180329000Z_0019415","ground_truth":{"detection_guidance":"Sigma rule for ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Collection"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250911T185825000Z_0019417","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251125T093506000Z_0019419","ground_truth":{"... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Command and Control","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260806T233... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260626T070827000Z_0019423","ground_truth":{"detection... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Privilege Escalation","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250913... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Persistence","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260225T155235000Z_0019427","ground_truth"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Impact","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260923T220832000Z_0019429","ground_truth":{"detect... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250331T064911000Z_0019431","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Impact","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250803T183218000Z_0019433","ground_truth":{"detection_guidance":"Sigma... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250419T123829000Z_0019435","ground_truth":{"detectio... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251106T094231000Z_0019437","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Execution","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261116T124005000Z_0019439","ground_truth":{"detec... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261214T232045000Z_0019441","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | ... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Credential Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250622T154854000Z_0019443","groun... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250427T073701000Z_0019445","ground_truth":{"detection_guidance... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Execution","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251015T063821000Z_0019447","ground_truth":{"detection_guid... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250129T211800000Z_0019449","ground_truth":{"d... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261110T011825000Z_0019451","ground_truth":{"detection_guidance":"Sigma rul... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251031T193334000Z_0019453","ground_truth":{"detection_guidance":"Sig... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260418T190013000Z_0019455","ground_truth":... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Execution","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251209T062054000Z_001945... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20251222T002220000Z_0019459","ground_truth":{"detection_guida... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Execution","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261225T135820000Z_0019461","groun... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250108T052516000Z_0019463","ground_truth":{"detection_guid... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Collection"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260601T035222000Z_0019465","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251207T141542000Z_0019467","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Discovery","Command and Control"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250804T114958000Z_0019471","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Exfiltration","Execution"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250322T030843000Z_0019473","ground_truth":{"detection_gui... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260203T045541000Z_0019475","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260329T005246000Z_0019477","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260905T055648000Z_0019479","ground_trut... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260420T171531000Z_0019481","ground_tr... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250425T075116000Z_0019483","ground_truth":{"detection_guidance":"Sigma rule for T1021.... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Privilege Escalation","Command and Control"],"technique_id":"T1484.001"},"event_id":"e... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260712T140834000Z_0019487","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Execution"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260131T161856000Z_0019489","ground_truth"... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250119T065154000Z_0019491","ground_truth":{"detection_guidance":"Sigma rule for T1059.00... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250901T064923000Z_0019493","ground_truth":{"detection_g... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261008T184159000Z_001... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250330T18... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260127T211109000Z_0019499","ground_truth":{"detection_guidance":"Sigma rule f... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Collection","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260322T063920000Z_0019501","ground_t... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250528T024456000Z_0019... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Credential Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20260306T172932000Z_0019505",... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250220T073313000Z_0019507","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20261120T124037000Z_0019509","ground_truth":{"detecti... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250614T035410000Z_0019511","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260212T223956000Z_0019513","ground_truth":{"detection_guidance":"Sigma rule fo... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Privilege Escalation","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250411T204511000Z_0019515","ground_t... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Defense Evasion","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260108T124930000Z_0019517","ground_trut... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Reconnaissance","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251129T175114000Z_001... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261124T180900000Z_001952... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250327T004711000Z_0019523","ground_truth":{"detection_guidance":"... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Execution","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251220T18... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250116T121356000Z_0019527","ground_truth":{"detection_guidance":"Sigm... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260624T071849000Z_0019529","ground_truth":{"detectio... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251005T094632000Z_0019531","ground_truth":{"detection_guidance":"Sigma r... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250908T043239000Z_0019533","ground_truth":{"detection_guidance":"Sigma rule for T1021.... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251120T055410000Z_0019535","ground_truth... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Privilege Escalation","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260328T1729190... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260107T094323000Z_0019539","ground_truth":{"d... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Credential Access","Impact"],"technique_id":"T1484.001"},"event_id":"evt_mustangp... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Collection","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260309... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Discovery","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260320T234231000Z_00... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261108T042040000Z_0019547","ground... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Execution"],"technique_id":"T1531"},"event_id":"evt_apt41_20250103T184115000Z_0019549","ground_truth":{"detection_... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Discovery"],"technique_id":"T1531"},"event_id":"evt_fin7_20261219T132638000Z_0019551","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt29_20260522T033929000Z_0019553","ground_truth":{"detection_guidance":"Sigma rule... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Execution","Impact","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261107T155231000Z_0019555","ground_truth":{"detection_guidance":"Sigma rule for... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Initial Access","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250522T093737000Z_0019557","ground_truth... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250426T231554000Z_0019559","ground_truth":{"detectio... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250814T082938000Z_0019561","ground_truth":{"det... |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260819T213259000Z_0019563","ground_truth":{"detection_guidance":"Si... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Discovery","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250608T213521000Z_0019565","grou... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250626T110402000Z_0019567","ground_truth":{"detection_guid... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Collection","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260503T044709000Z_0019569","ground_truth":{"detection_guidanc... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Defense Evasion","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250320T061450000Z_0019571","ground_truth"... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20251102T090301000Z_0019573","ground_truth":{"detection_guidance":"Sigma ... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Privilege Escalation","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260517T210527000Z_0019575","ground_truth":{"detection_... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Credential Access","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20261217T063132000Z_0019577","groun... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260807T073545000Z_0019579","ground_truth":{"detect... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250827T195047000Z_0019581","ground_truth":{"detection_guidance":... |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250121T051210000Z_0019583","gr... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Command and Control","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Collection"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260429T235609000Z_0019587","ground... |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Defense Evasion","Execution"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250531T031557000Z... |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250611T052757000Z_0019591","ground_truth":{"det... |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260716T171826000Z_0019593","ground_truth":{"detection_guidan... |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261104T141631000Z_0019595","ground_truth":{"detection_guidance":"Sigma rule ... |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Credential Access","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251217T... |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Exfiltration","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260730T012441000Z_0019599","ground_tr... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.