text
stringlengths
1.13k
1.33k
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Command and Control","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_fin7_20260811T140642000Z_0005201","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251116T104956000Z_0005203","ground_tr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251001T183108000Z_0005205","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251105T012953000Z_0005207","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Privilege Escalation","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260815T090202000Z_0005209","ground_truth":{"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260112T145206000Z_0005211","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact","Persistence","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261215T034225000Z_0005213","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20261020T002518000Z_0005...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250218T061727000Z_0005217","ground_truth":{"detection...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Persistence","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260730T211313000Z_000521...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Lateral Movement","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251006T184358000Z_0005221","gro...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Reconnaissance","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261029T182629000Z_0005223","ground_truth"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261223T041033000Z_0005225","ground_truth":{"d...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260418T154452000Z_000...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20251026T081739000Z_0005229","ground_truth":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250615T043228000Z_0...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Collection","Impact"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260425T113337000Z_0005233","...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20261115T042713000Z_0005235","ground...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250704T033316000Z_0005237","ground_truth":{"detect...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250721T205105000Z_0005239","ground...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Exfiltration","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250325T181940000Z_000...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Reconnaissance","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250918T141610000Z_0005243","gr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250106T093734000Z_0005245","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Impact"],"technique_id":"T1531"},"event_id":"evt_fin7_20251220T003424000Z_0005247","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260101T033635000Z_0005249","ground_truth":{"detection_guidance":"Sigma rule for T107...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260704T205802000Z_0005251","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260601T211824000Z_0005253","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260823T055937000Z_0005255","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Command and Control"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260228T090503000Z_0005257","gr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260816T092750000Z_0005259","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Persistence","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20251007T190458000Z_0005263","ground_truth":{"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260430T135104000Z_0005265","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Defense Evasion","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260927T024901000...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260310T021700000Z_0005269","ground_truth":{...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20260522T035820000Z_0005271","ground_truth...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250425T120227000Z_0005273","ground_truth...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250323T073507000Z_0005275","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Defense Evasion","Execution"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250930T163129000Z_0005277","ground_truth":{"detec...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260428T192242000Z_0005279","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260306T061306000Z_0005281","ground_truth":{"detection_g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_fin7_20250701T133848000Z_0005283","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Persistence","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250727T233627000Z_0005285","ground_truth":{"detect...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250319T104429000Z_0005287","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260124T083225000Z_0005289","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20261218T081...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Execution"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251213T012259000Z_0005293","...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251202T135351000Z_0005295","ground_truth":{"detection_guidance":"Sigma rule for T107...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251026T231053000Z_0005297","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260626T0...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250517T072924000Z_0005301","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250204T062736000Z_0005303","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250924T213216000Z_0005305","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Defense Evasion","Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20260618T084545000Z_0005307","grou...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Reconnaissance","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260223T092246000Z_0005309","ground_truth":{"dete...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260620T095142000Z_0005311","groun...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Collection"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260618T080944000Z_0005313","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260308T184432000Z_0005315","ground_truth":{"detection_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt29_20250426T013740000Z_0005317","ground_truth":{"detection_guidance":"Sigma rule for T1570 | J...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260128T033642000Z_0005319","ground...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260310T201754000Z_0005321","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251028T084838000Z_0005323","ground_truth":{"detection_gui...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Exfiltration","Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20260109T183312000Z_0005325","ground_t...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20251101T084521000Z_00053...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250312T220855000Z_0005329","ground_truth":{"detection_guidance":"Sigma rule for T157...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20261206T114357000Z_0005331","ground_truth...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Collection"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250928T025713000Z_0...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20251223T084455000Z_0005335","ground_truth":{"detection_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Initial Access","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261222T130858000Z_0005337","ground_truth":{"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261229T130611000Z_0005339","ground_truth":{"detec...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Command and Control","Initial Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260309T111243000Z...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Initial Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260810T234650000Z_0005343","ground...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Collection","Initial Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260823T070028000Z_0005345","ground_truth":{"de...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250315T130438000Z_0005347","ground_truth":{"detection_guida...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250623T165444000Z_0005349",...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Privilege Escalation","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt29_20250601T015209000Z_0005351","ground_truth":{"detection_guid...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250519T081653000Z_0005353","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251009T162239000Z_0005355","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Privilege Escalation","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250719T032617000Z_0005357","groun...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Defense Evasion","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260815T205428000Z_000...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Exfiltration","Impact"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260319T225250000Z_0005361","ground_truth":{"det...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Discovery","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20251208T110...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Privilege Escalation","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250606T065348000Z_0005365","gr...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Command and Control","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260713T104...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access","Lateral Movement","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250213T225440000Z_0005369","ground_truth"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt29_20260106T073506000Z_0005371","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Lateral Movement","Impact"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260524T063633000Z_0005373","ground_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260913T0010110...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Execution"],"technique_id":"T1531"},"event_id":"evt_fin7_20260814T063335000Z_0005377","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260821T115220000Z_0005379","ground_truth":{"detection_guid...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250426T110323000Z_0005381","ground_t...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260604T204654000Z_0005383","ground_truth":{"det...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261112T013248000Z_0005385","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Collection","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251108T080408000Z_0005387","ground_tr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251217T042522000Z_0005389","ground_truth":{"detection_gui...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20260219T110947000Z_0005391","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_i...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Discovery","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260305T...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260803T114803000Z_0005395","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251113T131227000Z_0005397","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261222T220548000Z_0005399","gro...