text
stringlengths
1.13k
1.33k
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250611T035811000Z_0005801","ground_tr...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260628T172630000Z_0005803","ground_truth":{"detection_gui...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Collection","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250116T072345000Z_0005805","gro...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Initial Access","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260620T123451000Z_0005807","ground_truth...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260408T131020000Z_0005809","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on s...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Discovery"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250307T133734000Z_0005811","ground_truth":{"detection_gui...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250409T042339000Z_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt41_20260126T153609000Z_0005815","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_apt41_20260927T164307000Z_0005817","ground_truth":{"d...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Persistence","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260809T060642000Z_0005819","ground_t...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Credential Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250328T092624000Z_0005821","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261219T162256000Z_0005823","ground_truth":{"detection_gu...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Execution"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260403T193331000Z_0005825","ground_truth":{"detecti...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261224T0202590...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260117T225957000Z_0005829","ground_truth":{"dete...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250409T004746000Z_0005831","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260515T130809000Z_0005833","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261202T082806000Z_00...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_fin7_20260718T180737000Z_0005837","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20251230T08141...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250731T045817000Z_0005841","ground_truth":{"detec...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250813T162032000Z_0005843","ground_truth":{"detection_gu...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260131T132714000Z_0005845","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260908T122138000Z_0005847","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261218T045538000Z_0005849","ground_trut...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Lateral Movement","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250207T111504000Z_0005851","ground_truth":{"detecti...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250914T122845000Z_0005853","ground_tru...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260426T071327000Z_0005855","ground_truth":{"detection_guidance":...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251026T140215000Z_0005857","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261019T091148000Z_0005859","ground_truth":{"detection_gu...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261223T030612000Z_0005861","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Lateral Movement","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250327T0115...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Execution","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260227T081911000Z_0005865","g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251220T225924000Z_0005867","ground_truth":{"detection_guid...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20251202T125151000Z_0005869","ground_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260813T050910000Z_0005871","ground_truth":{"detection_g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250902T051727000Z_0005873","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Credential Access","Collection"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260625T173722000Z_0005877","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250112T123257000Z_0005879","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact","Exfiltration","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20261027T000154000Z_0005881","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Initial Access","Impact"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261215T072640000Z_000588...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20251103T165836000Z_0005885","ground_truth":{"d...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261218T092046000Z_0005887","ground_truth":{"detection_gu...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260815T054512000Z_0005889","ground_truth":{"detection_guidance":"Sigma rule for T105...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250520T013721000Z_0005891","ground_truth":{"detection...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261030T160055000Z_0005893","ground_truth":{"detection_guidance...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Impact","Discovery","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260121T140556000Z_0005895","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Persistence"],"technique_id":"T1531"},"event_id":"evt_fin7_20260826T195828000Z_0005897","ground_truth":{"detection_guidance"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Defense Evasion","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250810T013158000Z_0005899","groun...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20251101T124127000Z_0005901","ground_truth":{"det...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250122T213913000Z_0005903","ground_truth":{"detection_guidance...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Defense Evasion","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260211T21225900...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260630T054810000Z_0005907"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt41_20260407T184711000Z_0005909","ground_truth":{"de...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution","Defense Evasion","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260504T055319000Z_0005911","ground_truth":{"detection_guidance":...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Command and Control","Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261222T233549000Z_0005913","ground_truth"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260522T045124000Z_0005915","gr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260517T104312000Z_0005917","ground_truth":{"detection_guidance":"Sigma rule for T105...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Privilege Escalation","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250506T164221000Z_0005...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Initial Access","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260709T004710000Z_000...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250901T132157000Z_0005923","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261010T183606000Z_0005925","ground_truth":{"de...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260317T173013000Z_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Credential Access","Execution"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251103T205625000Z_0005929","ground_truth":{"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260424T175935000Z_0005931","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260421T143030000Z_0005933","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261113T041604000Z_0005935","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join o...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Impact"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20251101T015948000Z_0005937","...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251209T190601000Z_0005939","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261006T075544000Z_0005941","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Credential Access","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250514T072355000...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251028T214055000Z_0005945","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250423T053229000Z_0005947","ground_truth":{"detection_guidance":"Sigma rule for T107...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Credential Access","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250928T192709000Z_0005949","grou...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Initial Access","Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260626T212640000Z_0005951...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Execution","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260207T134644000Z_0005953","grou...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Reconnaissance","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20251208T104751000Z_0005955","g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260713T232850000Z_0005957","ground_truth":{"detection_gu...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250329T133254000Z_0005959","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | J...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251103T052112000Z_0005961","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250319T104004000Z_0005963","ground_truth":{"detection_guidance":"Sigma rule for T157...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250918T100719000Z_0005965","ground_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260608T033634000Z_0005967","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt29_20260403T142506000Z_0005969","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Lateral Movement","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250719T112130000Z_00059...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Discovery","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261009T...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Persistence"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260302T154537000Z_0005975","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260711T021137000Z_0005977","ground_truth":{"detection...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251117T101328000Z_0005979","ground_truth":{"detection_guid...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Privilege Escalation","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250313T125337000Z_0005...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261212T230818000Z_0005983","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection"],"technique_id":"T1570"},"event_id":"evt_apt41_20260611T033906000Z_0005985","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt29_20260120T094902000Z_0005987","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Lateral Movement","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260612T205820000Z_0005989","ground_truth":{"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Credential Access"],"technique_id":"T1570"},"event_id":"evt_fin7_20261217T194827000Z_0005991","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261007T040026000Z_0005993","ground_tr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250221T184435000Z_0005995","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20261119T04555...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261104T075412000Z_0005999","ground_truth":{"detection_guidance":"Sigma rule for T1098.0...