text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20261110T055118000Z_0004401","grou...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Exfiltration","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250320T09434...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Discovery","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_fin7_20260907T033837000Z_0004405","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Defense Evasion","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250811T174915000Z_0004407","gro...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250723T013131000Z_0004409","groun...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260201T152731000Z_0004411","ground_truth":{"detecti...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250726T233113000Z_0004413","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Collection","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_2025080...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261017T173821000Z_0004417","ground_truth":{"d...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250129T091231000Z_0004419","ground_truth":{"detection_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260531T035900000Z_0004421","ground_truth":{"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250519T031256000Z_0004423","ground...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250122T134643000Z_0004425","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260818T021448000Z_0004427","ground_truth":{"detection_g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Privilege Escalation","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20261102T115853000Z_0004429","ground_truth"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Persistence","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261208T221206000Z_0004431","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Exfiltration","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261217T152135000Z_0004433","ground_truth":{"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260418T035849000Z_0004435","ground_truth":{"detec...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_fin7_20260909T220049000Z_0004437","ground_truth":{"detec...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Initial Access","Collection"],"technique_id":"T1546.003"},"event_id":"evt_mustangpand...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Execution"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260605T170227000Z_0004441","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261023T070130000Z_0004443","ground_truth":{"dete...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Reconnaissance","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_202603...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20251129T144145000Z_0004447","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Command and Control","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260119T065...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250426T075222000Z_0004451","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Defense Evasion","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250613T050325000Z_0004453","grou...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260913T103825000Z_0004455","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20251004T174313000Z_0004457","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250307T205257000Z_0004459","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250729T090916000Z_0004461","ground_truth":{"detectio...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Execution","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261107T001008000Z_0004463","g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250624T233434000Z_0004465","ground_truth":{"detec...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Initial Access","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260124T162122000Z_0004467","ground_truth":{"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260227T030511000Z_0004469","ground_truth":{"dete...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250122T175515000Z_0004471","ground_truth":{"detection_guidan...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Discovery","Impact"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250904T192734000Z_0004473","groun...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Credential Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260324T091909000Z_0004475","ground_trut...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260325T225048000Z_0004477","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251224T045709000Z_0004479","ground_truth":{"de...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt29_20260705T150714000Z_0004481","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260525T070844000Z_0004483","ground_truth...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261029T191824000Z_0004485","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261016T141407000Z_0004487","ground_truth":{"detection_guidance":"Sigma rule for T1071.00...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260825T010211000Z_0004489","ground_truth":{"det...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Reconnaissance","Execution"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260130T023038000Z_0004491","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Execution","Persistence"],"technique_id":"T1531"},"event_id":"evt_fin7_20250727T022542000Z_0004493","ground_truth":{"d...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Reconnaissance","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20251021...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Defense Evasion","Impact"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250507T173928000Z_0004497...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250207T224715000Z_0004499","ground_truth":{"detection...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Persistence","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_202...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Persistence","Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250713T070223000Z_0004503","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260730T215130000Z_0004505","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Credential Access","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250530T1913...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Reconnaissance","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20251029T152255000Z_0004509","ground_truth":{"detection_guid...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260217T201555000Z_0004511","ground_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Credential Access","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250326T122325000Z_0004513","gro...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Privilege Escalation","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_fin7_20261209T232333000Z_0004515","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250329T124329000Z_0004517","ground_truth":{"detection_guidance":"Sigma rule for T1098.00...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250728T080239000Z_0004519","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251003T061905000Z_0004521","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Defense Evasion","Execution"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250330T0238220...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_apt29_20260410T114307000Z_0004525","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250612T140102000Z_0004527","ground_truth":{"detection_guidance":"Sigma rule for T1059.00...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250320T090815000Z_0004529","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Exfiltration","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250130T112927000Z_0004531","ground_truth":{"dete...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250729T132631000Z_0004533","ground_truth":{"detect...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251014T013206000Z_0004535","ground_truth":{"detection...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250228T050723000Z_0004537","ground_truth":{"det...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251104T155742000Z_0004539","ground_tru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20261130T011351000Z_0004541","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Credential Access","Initial Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250130T101845000Z_0004543","gr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Collection"],"technique_id":"T1570"},"event_id":"evt_fin7_20260425T175500000Z_0004545","ground_truth":{"detection_guidance":"Sigma rule for T157...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260209T132002...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Collection","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260607T195653000Z_0004549","ground_truth":{"dete...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260208T015414000Z_0004551","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Initial Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260315T132137000Z_0004553","ground_truth":{"detect...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Execution"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20261111T224953000Z_0004555","ground...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260307T011147000Z_0004557","ground_truth":{"detection_guidance":"Sigma rule for T102...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20261004T212455000Z_0004559","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250519T210030000Z_0004561","gro...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260110T052845000Z_0004563","ground_truth":{"det...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251124T121603000Z_0004565","ground_truth":{"detection_guid...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_unc4841_20251213T163659000Z_0004567","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251203T193037000Z_0004569","ground_truth":{"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260326T234316000Z_0004571","ground_truth":{"detection_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250403T135957000Z_0004573","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260510T120614000Z_0004575","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251027T010717000Z_0004577","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260209T020935000Z_0004579","ground...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260807T001913000Z_0004581","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20261008T22275...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260114T175535000Z_0004585","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Credential Access","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250211T233939000Z_0004587","ground_truth":{"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261130T122635000Z_0004589"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20260913T175336000Z_0004591","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Credential Access","Collection"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250402T000000000Z_0004593","ground_truth":{...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260621T081800000Z_0004595","ground_truth":{"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260705T185153000Z_0004597","ground_truth":{"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Discovery","Execution"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260620T222606000Z_0004...