text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20261212T0745240...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20251019T204739000Z_0004203","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Reconnaissance","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260317T074107000Z_0004205","ground_truth":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250803T092604000Z_0004207","ground_truth":{"detection_g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20261025T131100000Z_0004209","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Collection","Execution"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250628T005643000Z_0004211","ground_truth":{...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Credential Access","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260912T142700000Z_0004213","ground_truth":{...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250622T163659000Z_0004215","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260410T094606000Z_0...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Collection","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20251003T09582...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250830T000938000Z_0004221","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Execution","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260425T133046000Z_0004223","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Privilege Escalation","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260415T173332000Z_0004225","groun...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Reconnaissance","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261214T185424000Z_0004227","...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250801T184618000Z_0004229","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260728T231400000Z_0004231","ground_tr...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Impact","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250408T201111000Z_0004233",...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Discovery","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260418T235340000Z...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250912T102140000Z_0004237","ground_truth":{"detection_guidanc...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250723T153741000Z_0004239","ground_truth":{"detectio...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Impact","Execution"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20251007T153019000Z_00...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250512T122932000Z_0004243","ground_truth":{"detection_guidance...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_unc4841_20251015T054104000Z_0004245","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250818T195943000Z_0004247","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Command and Control","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250226T074628000Z_0004249","ground_truth":{"det...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Persistence","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_fin7_20250906T182826000Z_0004251","ground_truth":{"detection_guid...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20261203T094436000Z_0004253","ground_truth":{"detection_guidan...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250820T183146000Z_0004255","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261024T152507000Z_0004257","ground_truth":{"detection_guidance":"Sigma rule for T1071...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250523T104918000Z_0004259","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260323T201535000Z_0004261","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250506T081123000Z_0004263","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261017T201533000Z_0004265","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Privilege Escalation","Impact"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250702T000541000Z_0004267"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250503T1041290...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Reconnaissance","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261103T220353000Z_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260910T083555000Z_0004273","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250801T082927000Z_0004275","ground_tr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250822T130148000Z_0004277","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Initial Access","Impact","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20251216T001238000Z_0004279","ground_truth":{"detection_gui...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260213T060453000Z_0004281","ground_truth":{"det...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260705T143213000Z_0004283","ground_truth":{"detection_guidance":"Sigma rule for T105...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Persistence","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260329T035423000Z_0004285","ground_truth":{"detec...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Discovery","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250720T222841000Z_0004289","ground_truth":{"detection_guidance":...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251031T090754000Z_0004291","ground_truth":{"dete...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250608T173327000Z_0004293","ground_truth":{"detection_guidance":"Sigma rule for T1059.0...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20251217T185728000Z_0004295","ground_truth":{"detection_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Credential Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261003T185241000Z_0004297",...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt41_20250322T022008000Z_0004299","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_fin7_20260715T082839000Z_0004301","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Reconnaissance","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260222T143850000Z_0004303","ground_truth":{"detec...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Execution"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250517T175908000Z_0004305","ground_truth":{"detecti...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251023T024846000...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Credential Access","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261007T040242000Z_0...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261216T062300000Z_0004311","ground_truth":{"detection_guida...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260106T033949000Z_0004313","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250128T010418000Z_0004315","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260707T162549000Z_0004317","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Persistence","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250430T225601000Z_0004319","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260408T231443000Z_0004321","ground_truth":{"detectio...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250311T155123000Z_0004323","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20260420T094839000Z_0004325","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Defense Evasion","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250724T065918000Z_0004327","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20261203T102616000Z_0004329","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Impact","Collection"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspid...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260307T211213000Z_0004333","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260111T230152000Z_0004335","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250808T053150000Z_000433...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261212T001407000Z_0004339","grou...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250615T200154000Z_0004341","ground...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_fin7_20250728T155543000Z_0004343","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260815T012557000Z_0004345","ground_truth...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Reconnaissance","Execution"],"technique_id":"T1570"},"event_id":"evt_apt41_20260920T002150000Z_0004347","ground_truth":{"detection_guidance"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251103T053825000Z_0004349","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection"],"technique_id":"T1570"},"event_id":"evt_unc4841_20261005T134634000Z_0004351","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Collection","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260324T041709000Z_0004353","...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250430T171730000Z_0004355","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260529T155805000Z_0004357","ground_truth":{"detect...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260417T071220000Z_0004359","ground_truth":{"detec...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260621T082901000Z_0004361","ground_truth":{"detection_guidance":"Sigma rule for T1059.00...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20251016T02020500...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260121T084154000Z_0004365","ground_truth":{"detection_gu...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20251129T230938000Z_0004367","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260125T005820000Z_0004369","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250718T132311000Z_0004371","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250719T0...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260206T150007000Z_0004375","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt29_20260506T014842000Z_0004377","ground_truth":{"detection_guidan...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261129T095824000Z_0004379","ground_truth":{"dete...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260712T120411000Z_0004381","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Exfiltration","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261111T053157000Z_0004383","ground...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Defense Evasion","Collection"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_202...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Lateral Movement","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250112T174143000Z_0004387","gr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251228T020041000Z_0004389","ground_truth":{"de...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Discovery","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260916T034947000Z_0004391","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251115T230828000Z_0004393","ground_truth":{"detection_guidance":"Sigma rule for T1021....
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260109T034415000Z_0004395","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Defense Evasion","Execution"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250807T173932000Z_0004399","ground_truth":{"detection_guidance"...