text
stringlengths
1.13k
1.33k
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Collection"],"technique_id":"T1570"},"event_id":"evt_fin7_20260228T001958000Z_0007001","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251017T023147000Z_0007003","ground_truth":{"detection_gui...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Execution"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250917T113959000Z_0007005","ground_truth":{"detection_guidance":"Sigma rule for T1098.004...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250106T150514000Z_0007007","ground...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250419T055702000Z_0007009"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250211T072518000Z_0007011","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250310T073359000Z_0007013","ground_t...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260720T133755000Z_0007015","ground_truth":{"detection_guida...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260505T122515000Z_0007017","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250131T015439000Z_0007019","ground_truth":{"detection_guidance":"Sigma rule for T1059.0...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250731T075906000Z_0007021","ground_truth"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250816T064126000Z_0007023","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260801T003030000Z_0007025","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261211T122108000Z_0007027","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250626T064405000Z_0007029","ground_t...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250804T131112000Z_0007031","ground_truth":{"detection_guid...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260405T014835000Z_0007033",...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250109T143557000Z_0007035","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260413T214017000Z_0007037","ground_truth":{"detect...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251230T153710000Z_0007039","ground_truth":{"detec...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261020T091952000Z_0007041","ground_truth":{"detection_guidan...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260824T215047000Z_0007043","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Lateral Movement","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Defense Evasion","Impact"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251206T082819000Z_0007047","g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Execution"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260701T110402000Z_0007049","ground_truth":{"detection_guidance"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250508T021256000Z_0007051","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Impact","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250214T052405000Z_0007053","ground_truth":{"detection_guidance":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250210T024621000Z_0007055","ground_truth":{"de...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260425T203423000Z_0007057","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261126T095534000Z_0007059","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Defense Evasion","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250609T150935...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260301T044831000Z_0007063","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Reconnaissance","Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260317T034159000Z_0007065","ground_truth":{"detecti...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20261125T220254000Z_0007067","ground_t...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261215T204641000Z_0007069","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251119T195204000Z_0007071","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_apt29_20260107T120235000Z_0007073","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260112T070545000Z_0007075","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Reconnaissance","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20261213T223912000Z_0007077","ground_truth":{"de...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250628T012317000Z_0007079","ground_truth":{"detection_guidance...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Initial Access","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250404T084401000Z_0007...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251226T050648000Z_0007083","groun...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260219T045132000Z_0007085","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250227T230022000Z_0007087","ground_truth":{"detection_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Command and Control","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250721T101516000Z_0007089","ground_truth...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260508T154224000Z_0007091","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20261024T074602000Z_00070...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Lateral Movement","Initial Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250916T130200000Z_0007095","ground_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261018T234337000Z_0007097","ground_truth"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260123T093323000Z_0007099","grou...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260624T030046000Z_0007101","ground_truth":{"detection_guidance":"Sigma rule for T1021.0...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250724T054911000Z_0007103","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250903T074437000Z_0007105","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Credential Access","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261226T075404000Z_0007107","g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250906T183621000Z_0007109","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251029T175112000Z_0007111","ground_truth":{...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Command and Control","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260925T132027000Z_0007113","ground_tr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260421T222609000Z_0007115","grou...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Impact","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261121T024811000Z_0007117","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250602T210022000Z_0007119","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260809T200734000Z_0007121","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260804T195229000Z_0007123","gr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250818T215704000Z_0007125","ground_truth":{"detection_guidance":"Sigma rule for T109...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Impact"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250118T170041000Z_0007127","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Reconnaissance","Discovery"],"technique_id":"T1531"},"event_id":"evt_fin7_20250601T204032000Z_0007129","ground_trut...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Command and Control","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260206T135744000Z_0007131","ground_truth":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Command and Control","Persistence"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260522T075145000Z_0007133","ground_truth":{"det...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250219T225603000Z_0007135","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250506T115320000Z_0007137","ground_t...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Exfiltration","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260901T235506000Z_0007139","ground_truth":{"det...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20260201T184320000Z_0007141","ground_truth":{"detection_guidance":"Sigma rule for T1570...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_fin7_20260717T190849000Z_0007143","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250305T084255000Z_0007145","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261110T012739000Z_0007147","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260911T121228000Z_0007149","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250825T235254000Z_0007151","ground_truth":{"detecti...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Impact"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260731T090152000Z_0007153","ground_truth":...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Initial Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260225T042711000Z_000715...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Privilege Escalation","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251121T182537000Z_0007157","ground_truth...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Execution"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250919T193218000Z_0007159","ground_truth":{"de...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Discovery"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251221T221206000Z_0007161","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt41_20250726T122647000Z_0007163","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251222T202609000Z_0007165","ground_truth":{"detecti...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Discovery","Collection"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_2026122...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250714T174429000Z_0007169","ground_truth":{"detection_gu...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt41_20251104T165428000Z_0007171","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20250620T153051000Z_0007173","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250223T235442000Z_0007175","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Reconnaissance","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250212T115259000Z_0007177","ground_truth":{"detectio...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250817T104932000Z_0007179","ground_truth...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250430T202638000Z_0007181","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260302T012222000Z_0007183","ground_truth":{"detect...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250730T034056000Z_0007185","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Joi...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Privilege Escalation","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250409T050636000Z_0007187","gr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250330T103301000Z_0007189","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Defense Evasion","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260227T025757000Z_0007191","groun...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Lateral Movement","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Credential Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250215T032551000Z_0007195","gr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260408T154743000Z_0007197","ground_truth...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Initial Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260910T105923000Z_0007199","ground_truth":{"detection_guida...