text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260408T155952000Z_0005001","ground_truth"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Execution"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260308T160323000Z_0005003","groun...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250704T012424000Z_0005005","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20251112T143323000Z_0005007","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250401T193039000Z_0005009","grou...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Execution","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_2025...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Reconnaissance","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250914T080906000Z_0005013","ground_truth":{"detection_guidance...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250302T232414000Z_0005015","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Initial Access","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251015T071710000Z_0005017","g...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250216T044933000Z_0005019","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20251012T121714000Z_0005021","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Defense Evasion","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20261012T092529000Z_0005023","gro...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250305T162338000Z_0005025","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250503T160641000Z_0005027","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Initial Access","Impact"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20261125T140...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Privilege Escalation","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260303T0550...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250407T075959000Z_0005033","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join o...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250627T053127000Z_0005035","ground_truth":{"detection_guid...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Command and Control","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250522...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260112T214932000Z_0005039","ground_truth":{"detection_guidan...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260126T105943000Z_0005041","g...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250509T082151000Z_0005043","ground_truth":{"detection_guidance...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Persistence"],"technique_id":"T1531"},"event_id":"evt_fin7_20261110T141832000Z_0005045","ground_truth":{"detection_guidanc...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260617T072951000Z_0005047","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Defense Evasion","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20251213T115354000Z_0005049","gr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Execution","Impact"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250728T011139000Z_0005051","ground_truth...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Lateral Movement","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251021T231515000Z_000...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251026T135700000Z_0005055","ground_truth":{"detec...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Command and Control","Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20251205T125808000Z_0005057","ground_truth":{"detectio...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Reconnaissance","Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260830T233701000Z_0005059","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Collection","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260210T094034000Z_0005061","ground_truth":{"detecti...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Initial Access","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20260819T163226000Z_0005063","ground...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250320T163229000Z_0005065","ground_tr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Collection","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250319T221204000Z_0005067","ground_truth":{"detection_gui...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261017T151730000Z_0005069","ground_truth":{...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Credential Access","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_202...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250119T1541320...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250919T041554000Z_0005075","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250713T112338000Z_0005077",...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250310T022746000Z...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250925T215419000Z_0005081","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20251028T141254000Z_0005...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Initial Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250123T171501000Z_0005085","g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260426T214255000Z_0005087","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260428T113026000Z_0005089","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Exfiltration","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260212T074227000Z_0005091","ground_truth":{"detection_gu...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250722T064132000Z_0005093","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261221T095903000Z_0005095","ground_truth":{"detection_guidance...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260526T050842000Z_0005097","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260812T073325000Z_0005099","ground_truth":{...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20251002T205751000Z_0005101","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery","Command and Control","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250926T164641000Z_0005103","ground_truth...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Collection","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20261025T104548000Z_0005105","ground_truth":{"detection_gu...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260807T054101000Z_0005107","ground_truth...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260407T095430000Z_0005109","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Defense Evasion","Collection"],"technique_id":"T1484.001"},"event_id":"evt_scattere...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260122T055519000Z_0005113","...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250518T181713000Z_0005115",...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260117T081431000Z_0005117","ground_truth":{...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_2...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261204T224845000Z_0005121","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20261111T013311000Z_0005123","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250602T204126000Z_0005125","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250626T151423000Z_0005127","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250531T181421000Z_0005129","gr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Persistence","Collection"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20251215T043820000Z_0005131","ground_truth":{"detectio...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260129T204239000Z_0005133","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Discovery","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261202T022604000Z_0005135","ground_truth":{"detection...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260927T045844000Z_0005137","ground_truth":{"detection_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250729T220606000Z_0005139","ground_truth...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261005T011550000Z_0005141","gro...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260828T193210000Z_0005143","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Execution","Impact"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261207T042113000Z_0005145","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Impact"],"technique_id":"T1570"},"event_id":"evt_apt41_20251114T041954000Z_0005147","ground_truth":{"detection_guidance":"Sigma rule for T1570 |...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260905T064524000Z_0005149","ground_truth":{"detection_guidance":"Sigma rule for T109...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Persistence","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260113T050620000Z_0005151","ground_truth":{"detection_g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Privilege Escalation","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_lapsus_20251117T124713000Z_0005153","ground_truth":{"dete...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Lateral Movement","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"ev...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Execution","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250724T224602000Z_0005157","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Reconnaissance","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Persistence","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260831T171943000Z_0005161","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261120T065411000Z_0005163","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Privilege Escalation","Collection"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250612T211156000Z_00...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Discovery"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250105T080746000Z_0005167","ground_t...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260110T012759000Z_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260520T011807000Z_0005171","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Impact","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261205T061243000Z_0005173","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250227T052134000Z_0005175","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Lateral Movement","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260206T14381...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Initial Access","Impact"],"technique_id":"T1570"},"event_id":"evt_apt29_20251025T022645000Z_0005179","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250427T072752000Z_0005181","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Defense Evasion","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250215T070557000Z_0005183","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250721T174751000Z_0005185","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250827T092048000Z_0005187","ground_truth":{"detection_guid...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251008T120113000Z_0005189","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260603T143102000Z_0005191","ground_truth"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260914T110016000Z_0005193","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Defense Evasion","Command and Control"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_202...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260318T030450000Z_0005197","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260209T095733000Z_0005199","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ...