text
stringlengths
1.13k
1.33k
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Execution","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251204T071221000Z_0005401","ground_truth...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20261029T100722000Z_0005403","grou...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt29_20260611T005116000Z_0005405","ground_truth":{"detection_guid...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250731T114503000Z_0005407","ground_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Impact"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250225T083034000Z_0005409","groun...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260226T180122000Z_0005411","g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Execution","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250627T175233000Z_0005413","ground_truth":{"detection_guidance...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Impact","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261116T081554000Z_0005415","g...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260708T230211000Z_0005417","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250417T023357000Z_0005419","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260606T071853000Z_0005421","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260719T235804000Z_0005423","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join o...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Collection"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260428T173942000Z_0005425","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250103T184541000Z_0005427","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Collection","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260718T023727000Z_0005429","grou...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250419T121946000Z_0005431","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250608T145101000Z_0005433","ground_truth":{"detecti...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Execution"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260904T074427000Z_0005435","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251129T124633000Z_0005437","ground_t...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Privilege Escalation","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_202611...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Reconnaissance","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250622T19063...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Initial Access","Impact"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250802T090215000Z_0005443","ground_truth":{...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Discovery","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260212T232353000Z_0005445","ground_truth":{"detection_guidance...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Collection"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260702T234359000Z_0005447","ground_trut...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250320T032513000Z_0005449","ground_truth"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Initial Access","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251129T061409000Z_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Initial Access","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250707T153628000Z_0005453","ground_truth...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250830T150308000Z_0005455","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250308T084210000Z_0005457","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_apt29_20251025T040031000Z_0005459","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Execution","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_2025121...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Credential Access","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250216T012412000Z_0005463","ground_t...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Command and Control","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260704T170309000Z_0005465...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Lateral Movement","Persistence"],"technique_id":"T1570"},"event_id":"evt_apt41_20261213T160730000Z_0005467","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Impact"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250219T081127000Z_0005469","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Initial Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260610T213756000Z_0005471","ground_tru...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261128T162434000Z_0005473","ground_trut...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Discovery","Impact"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260525T063909000Z_0005475","ground_truth":{"detection_guida...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Initial Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt29_20250213T001142000Z_0005477","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261212T165103000Z_0005479","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260112T143646000Z_0005481","ground_truth":{"detection_guidance":"Sigma rule for T1098....
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution","Exfiltration","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250726T050634000Z_0005483","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250708T134026000Z_0005485","ground_truth":{"detection_guida...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260501T171217000Z_0...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20251118T021913000Z_0005489","ground_truth":{"detectio...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20250402T124659000Z_0005491","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250712T020032000Z_0005493","ground_truth":{"detect...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20261129T020200000Z_0005495","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250216T035618000Z_0005497","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261002T004713000Z_0005499","ground_tr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251218T114537000Z_0005501","ground_truth":{"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260626T030207000Z_0005503","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Impact","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250125T184424000Z_0005...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Execution","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250814T194448000Z_0005507","ground_truth":{...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Lateral Movement","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20261007T161325000Z_00...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_fin7_20260410T200904000Z_0005511","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip w...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250409T051819000Z_0005513","ground_truth":{"detectio...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Exfiltration","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt41_20261115T161422000Z_0005515","ground_truth":{"detect...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250806T180458000Z_0005517","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260102T134648000Z_0005519","ground_truth":{"detection_gu...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20251031T203420000Z_0005521","ground_truth":{"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251125T215558000Z_0005523","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Exfiltration","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251004T035446000Z_0005525","ground_truth":{"detection_gu...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20250923T155158000Z_0005527","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Exfiltration","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260212T224443000Z_0005531","ground_truth":{"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260328T123327000Z_0005533","ground_trut...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Credential Access","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260120T003442000Z_0005535","ground_tru...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250402T022358000Z_0005537","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt29_20260408T143619000Z_0005539","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Joi...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260111T001955000Z_0005541","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Persistence","Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20261106T095424000Z_0005543","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Lateral Movement","Collection"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250424T164921000Z_0005545","ground_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251206T161831000Z_0005547","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Persistence","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttypho...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Persistence","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260915T040937000Z_000...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260303T221853000Z_0005553","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join o...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260309T071454000Z_0005555","ground_truth":{"det...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Lateral Movement","Impact"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250920T113413000Z_0005557","ground_truth":{"detection_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Defense Evasion","Execution"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20261022T203527000Z...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260227T052401000Z_0005561","ground_truth":{"detection_guidance":"Sigma rule for T105...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250112T071655000Z_000...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251012T092018000Z_0005565","ground_truth":{"detection...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Collection"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250609T182841000Z_0005567","ground_truth":{"dete...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250415T012624000Z_0005569","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261218T211231000Z_0005571","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Impact"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250425T184048000Z_0005573","ground_truth":{"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260124T043201000Z_0005575","ground_tru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260302T073655000Z_0005577","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261205T170053000Z_0005579","ground_truth":{...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Command and Control","Execution"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250903T180836000Z_0005581","ground_truth"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260114T183722000Z_0005583","ground...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260404T124846000Z_0005585","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250630T015233000Z_0005587","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Persistence"],"technique_id":"T1531"},"event_id":"evt_fin7_20260524T174431000Z_0005589","ground_truth":{"detection_gu...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Defense Evasion","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250118T0...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Defense Evasion","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250601T220440000Z_0005593","ground_truth":{...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20250921T062549000Z_0005595","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260104T064328000Z_0005597","ground_t...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260328T194016000Z_0005599","ground...