text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Impact","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250721T214214000Z_0004...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Initial Access","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250811T080625000Z_0004003","ground_truth":{"detection_gu...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20261031T020205000Z_0004005","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250125T010734000Z_0004007","ground_truth":{"detection_gu...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Persistence","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260810T225820000Z_0004009","ground_truth":{"dete...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Collection"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260330T014815000Z_0004011","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260201T094328000Z_0004013","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250517T174246000Z_0004015","ground_truth":{"detection_guidan...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260822T065425000Z_0004017","ground_truth":{"dete...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Collection","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260721T045203000Z_0004019","ground_truth":{"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Impact","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_2026...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261027T155009000Z_0004023","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Credential Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20251121T132832000Z_0004025","ground_truth":{"dete...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250916T151609000Z_0004027","g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Collection"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260529T091600000Z_0004029","ground_truth":{"dete...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250402T084013000Z_0004031","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250115T044221000Z_0004033","ground_truth":{"detection_guidance...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250805T135637000Z_0004035","ground_truth":{"detection_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_2026031...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Discovery","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250519T130525000Z_0004039","ground_truth":{"detection_guida...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Lateral Movement","Persistence"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260209T082026000Z_0004041","ground_truth":{"de...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260922T032044000Z_0004043","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Discovery","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260528T173126000Z_0004045","ground_truth":{"detection_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250814T220353000Z_0004047","ground...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260809T233110000Z_0004049","ground_truth":{"detec...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact","Lateral Movement","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260811T022645000Z_0004051","ground_tr...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Privilege Escalation","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250520T...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Exfiltration","Execution"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261107T154212000Z_0004055","ground_truth":{"detection_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Persistence","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250531T021949000Z_0004057","ground_truth":{"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261018T234925000Z_0004059","ground_truth...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261024T030912000Z_0004061","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251109T211734000Z_0004063","ground_truth":{...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_fin7_20250826T081118000Z_0004065","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250612T205027000Z_0004067","ground_truth":{...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20251213T172452000Z_0004069","ground_truth...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Persistence"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250316T040715000Z_0004071","ground_truth"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250125T034205000Z_0004073","ground_truth":{"detection_gui...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_2...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260822T2218...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261218T034827000Z_0004079","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt41_20250104T183253000Z_0004081","ground_truth":{"detection_guidan...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250603T183426000Z_0004083","grou...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Initial Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260311T092645000Z_0004085","ground_truth":{"detec...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250319T051416000Z_0004087","gro...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Privilege Escalation","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251206T014600000Z_0004089","ground_tr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Credential Access","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250609T122142000Z_0004091","ground_truth":{"de...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260422T115714000Z_0004093","ground_truth":...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250604T165042000Z_0004095","ground_truth":{"detection...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260624T230308000Z_0004097","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260603T150906000Z_0004099","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Lateral Movement","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20251103T170426000Z_0004101","ground_truth...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250608T015817000Z_0004103","ground_truth":{"detection_guidance":"Sigma rule for T1059.001...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250318T020217000Z_0004105","ground_truth":{"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Collection"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250320T211304000Z_0004107","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250602T235222000Z_0004109","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260516T054422000Z_0004113","ground_truth":{"detection_gui...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Discovery","Initial Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260514T14274500...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250121T174827000Z_0004117","...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261119T153750000Z_0004119","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Persistence","Credential Access"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260206T153800000Z_0004121","ground_truth":{"detection_guidance...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Execution","Collection"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250526T085643000Z_00...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Credential Access","Persistence"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261213T211503000Z_0004125","ground_tru...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250704T103844000Z_0004127","ground_truth":{"d...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251231T123208000Z_0004129","ground_truth":{"det...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20251026T231434000Z_0004131","grou...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260926T061227000Z_0004133","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Discovery","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt29_20261109T031839000Z_0004135","ground_truth":{"detection...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260312T190950000Z_0004137","ground_truth":{...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Privilege Escalation","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260212T001911000Z_0004139","ground_truth":...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251115T092057000Z_0004141","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20250713T111943000Z_0004143","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250110T201616000Z_0...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250710T075900000Z_0004147","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Command and Control","Initial Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261022T005138000Z_0004149","ground_tr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260630T204129000Z_0004151","ground_truth...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Credential Access","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250804T105549000Z_0004153","ground_tr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260827T214844000Z_0004155","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250504T070308000Z_0004157","ground_truth":{"detectio...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260528T085733000Z_0004159","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250416T174510000Z_0004161","ground_truth":{"detection_gui...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Impact","Collection"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250902T165453000Z_0004163","ground_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260521T185524000Z_0004165","ground_truth":{"detection_guidance":"Sigma rule for T1098....
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Privilege Escalation","Collection"],"technique_id":"T1546.003"},"event_id":"evt_sca...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Reconnaissance","Execution"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251016T150246000Z_0004169","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Execution"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250814T125322000Z_0004171","ground_truth":{"detectio...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20251130T055414000Z_0004173","ground_truth":...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Exfiltration","Discovery"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250622T183830000Z_0004...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250705T234606000Z_0004177","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Lateral Movement","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250912T171018000Z_0004179","ground_t...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260328T124646000Z_0004181","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Impact"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250828T121620000Z_0004183","ground_truth":{"detection_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250206T193542000Z_0004185","ground_truth":{"detection_guidance":"Sigma rule for T1098.004...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250104T085523000Z_0004187","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_202601...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20260929T181907000Z_0004191","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Initial Access","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250728T1941...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_apt29_20250824T011835000Z_0004195","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Privilege Escalation","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260427T11352300...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Impact"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260306T070516000Z_0004199","ground_truth":{"detection_g...