text
stringlengths
1.13k
1.33k
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250423T005207000Z_0002001","ground_truth":{"detection_guidance":"Sigma rule for T1098.004...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Credential Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250418T072427000Z_0002003","...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260414T231240000Z_0002005","ground...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Command and Control","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260904T074428000Z_0002007","ground_truth"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250702T023010000Z_0002009","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260817T130546000Z_0002011","ground_truth":{"detec...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Reconnaissance","Command and Control"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250701T155934000Z_0002013","ground_truth":{...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Defense Evasion","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260329T185707000Z_0002015","ground_truth":{"detection_guidan...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Collection"],"technique_id":"T1570"},"event_id":"evt_apt29_20260426T032549000Z_0002017","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Impact","Discovery"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251217T222211000Z_0...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260912T170050000Z_0002021","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260713T210548000Z_0002023","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Execution","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250110T094451000Z_0002025","...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260821T164026000Z_0002027","ground_truth":{"detection_guida...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Lateral Movement","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250821T172348000Z_0002029",...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Privilege Escalation","Collection"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261009T1711...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250118T142030000Z_0002033","ground_truth":{"dete...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Discovery"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260310T163924000Z_0002035","gro...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Initial Access","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261120T125455000Z_0002037","ground_truth":{"detec...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence","Execution","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251011T000813000Z_0002039","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260531T094819000Z_0002041","ground_truth":{"de...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250208T234406000Z_0002043","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261114T062718000Z_0002045","gr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Lateral Movement","Execution"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260704T220454000Z_0002047","ground_truth":{"detection_g...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Defense Evasion","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250221T115433000Z_0002049","grou...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Discovery"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261207T010303000Z_0002051","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251014T050417000Z_0002053","ground_trut...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Execution"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250316T062119000Z_0002055","ground_truth...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Discovery","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251003T223556000Z_0002057","ground_tru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260405T200111000Z_0002059","ground_truth":{"detection_gui...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250529T162816000Z_0002061","ground_truth":{"detection_g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Persistence","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260720T012914000Z_0002063","ground_truth":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250521T163719000Z_0002065","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250318T1621...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260321T133300000Z_0002069","ground_truth":{"detection_g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Discovery","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260102T062520000Z_0002071","ground_truth":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Lateral Movement","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260414T0...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251109T222858000Z_0002075","ground_truth...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250919T063753000Z_0002077","ground_truth":{"detection_guida...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250719T033517000Z_0002079","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Privilege Escalation","Execution"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260906T212612000Z_0002081","ground_truth":{"detection_gui...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_apt41_20260419T072554000Z_0002083","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20251026T094949000Z_0002085","ground_truth":{"detec...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260224T115936000Z_0002087","ground_truth":{"detection_guid...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260611T181541000Z_0002089","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Reconnaissance","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260713T004243000Z_0002091","ground_tr...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261016T201504000Z_0002093","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Reconnaissance","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt41_20250916T051149000Z_0002095","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250504T052545000Z_000...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261001T033044000Z_0002099","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Exfiltration","Impact"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250224T123537000Z_0002101","ground...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251003T132244000Z_0002103","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260627T150233000Z_0002105","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Lateral Movement","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250304T231429000Z_0002107","ground...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Defense Evasion","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261030T043248000Z_0002...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Execution"],"technique_id":"T1531"},"event_id":"evt_apt41_20260321T201417000Z_0002111","ground_truth":{"detection_g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260730T034526000Z_0002113","ground_truth":{"detect...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_unc4841_20251225T225555000Z_0002115","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251229T151448000Z_0002117","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Initial Access","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250611T034938000Z_0002119","ground_truth":{"de...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261017T002755000Z_0002121","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260119T013659000Z_0002123","ground_truth":{"de...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Discovery","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260512T142906000Z_0002125","ground_truth...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Collection"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261108T153636000Z_0002127","ground_truth":{"detection_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250825T180700000Z_0002129","ground_truth":{"detec...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250130T063733000Z_0002131","ground_truth":{"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Impact"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260508T050822000Z_0002133","ground_truth":{"detection_guid...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250417T200106000Z_0002135","ground_truth":{"dete...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250908T230923000Z_0002137","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250320T171938000Z_0002139","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251107T104926000Z_0002141","ground_truth":{"detecti...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261212T032435000Z_0002143","ground_truth":{"detection_guida...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Execution","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251002T204430000Z_0002145","ground_truth":{...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20261023T095104000Z_0002147","ground_truth":{"detection_g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Execution","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260316T223908000Z_0002151","ground_truth":{"detecti...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260601T142016000Z_0002153","ground_tr...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250808T011257000Z_000215...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Execution"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261102T074054000Z_0002157","ground_t...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251007T003057000Z_0002159","ground_truth":{"detection_gu...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Discovery","Collection"],"technique_id":"T1531"},"event_id":"evt_apt41_20260323T185943000Z_0002161","ground_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251017T040157000Z_0002163","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250924T014400000Z_0002165","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250628T212931000...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20261204T155903000Z_0002169","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260714T180036000Z_0002171","ground_truth":{"dete...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Execution"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260603T142140000Z_0002173","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250904T183813000Z_0002175","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250805T044646000Z_0002177","ground_truth":{"detection_guid...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Privilege Escalation","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250930T071517000Z_0002179",...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250218T015018000Z_0002181","ground_truth":{"detection_guidance":"Sigma rule for T1071...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250522T135852000Z_0002183","ground_truth":{"detection_guidan...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250918T074832000Z_0002185","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Collection","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250811T051337000...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Command and Control","Execution"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250902T234048000Z_0...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Credential Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260903T192623000Z_0002191"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20260910T201402000Z_0002193","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251224T181625000Z_0002195","ground...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250713T200137000Z_0002197","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Reconnaissance","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250714T110955000Z_0002199","ground_truth":{"detect...