text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250909T055717000Z_0007601","ground_truth":...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260529T115233000Z_0007603","ground_truth":{"detection_guidance":"Sigma rule for T107...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Collection","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250216T02581...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250912T133930000Z_0007607","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261213T144108000Z_0007609","ground_truth":{"detection_guidance":"Sigma rule for T1098....
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260308T112915000Z_0007611","ground_truth":{"detection_guidance"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260211T031733000Z_0007613","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Privilege Escalation","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250830T202729000Z_0007615","ground_truth":{"detecti...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260703T073108000Z_0007617","ground_truth":{"detection_guidance":...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250917T035841000Z_0007619","ground_truth":{"detection_guidance":"Sigma rule for T1059.00...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Command and Control","Impact"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250116T135910000Z_000762...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20261215T071050000Z_0007623","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260719T160929000Z_0007625","ground_truth":{...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Persistence","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260126T...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Impact","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt29_20250201T055051000Z_0007629","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260714T024558000Z_0007631","ground_truth":{"detect...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt29_20251014T035515000Z_0007633","ground_truth":{"detection_guidance":"Sigma rule for T157...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Privilege Escalation","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20251223T102904000Z_000...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250216T053757000Z_0007637","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Credential Access","Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250312T071759000Z_0007639","ground_truth":{"detection_guidance...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Lateral Movement","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250429T140413000Z_0007641","ground_tr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Credential Access","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20250514T074939000Z_0007643","ground_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250919T141711000Z_0007645","ground_truth":{"detection_gu...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260114T235701000Z_0007647","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Command and Control","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260221T160135000Z_0007649","ground_truth":...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250729T230052000Z_0007651","grou...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Persistence","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260305T003409000Z_0007653","ground_truth":{"detection_guida...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260727T104811000Z_0007655","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260718T032448000Z_0007657","ground_truth":{"detection_guidance"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260101T072919000Z_0007659","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20251004T072811000Z_0007661","ground_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Discovery","Impact"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250626T184233000Z_0007663...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260423T170958000Z_0007665","ground_truth":{"d...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261026T042942000Z_0007667","gr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260826T035745000Z_0007669","ground_truth":{"detection_guidance":"Sigma rule for T1098.00...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250615T154345000Z_0007671","ground_truth":{"detection_guidance":"Sigma rule for T1098.00...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20251117T220700000Z_0007673","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Discovery","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20251217T175119000Z...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260424T091414000Z_0007677","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Command and Control","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260611T223437000Z_00076...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250314T072606000Z_0007681"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_unc4841_20251206T213223000Z_0007683","ground_truth":{"detection_guidance":"Sigma rule for T1570 |...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Command and Control","Impact"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261211T041141000Z_0007685","ground_truth":{"detection_guidan...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Initial Access","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260829T192118000Z_0007687","ground_truth":{"detec...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261109T175551000Z_0007689",...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261231T080948000Z_0007691","ground_truth":{"detection_gui...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261118T225115000Z_0007693","ground_truth":{"d...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Command and Control","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260816T030421000Z_0007695","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250813T080205000Z_0007697","ground_truth":{"det...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260120T153226000Z_0007699","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251218T223405000Z_0007701","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260403T145817000Z_0007703","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20260621T145522000Z_0007705","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Execution"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20251215T151953000Z_0007707","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250209T150722000Z_0007709","ground_truth":{"detection_guid...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Initial Access","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20251225T190026000Z_0007711","...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260110T012626000Z_0007713","ground_truth":{"detec...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Credential Access","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250317T061031000...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261117T012317000Z_0007717","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260212T074648000Z_0007719","ground_truth"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260811T060333000Z_0007721","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Collection","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20261122T051938000Z_0007723","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251227T075952000Z_0007725","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250816T000146000Z_0007727","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Discovery","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20251017T101029000Z_0007...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250207T145139000Z_0007731","ground_truth":{"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260802T140823000Z_0007733","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Discovery","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260221T084856000Z_0007735","ground_truth":{"det...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Credential Access","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20261011T224226000Z_0007737","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Credential Access","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt29_20260309T005934000Z_0007739","ground_truth":{"de...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261121T200222000Z_0007741","ground_truth":{"detection_guidance":"Sigma rule for T15...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Discovery","Impact"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250730T181936000Z_0007743","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Initial Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251008T111026000Z_0007745",...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250116T161441000Z_0007747","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250612T012152000Z_0007749","ground_truth":{"detection_guidance...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Reconnaissance","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250825T083556000Z_0007751",...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251005T195653000Z_0007753","ground_truth":{"detection_guidance":"Sigma rule for T1098.0...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_fin7_20251124T231832000Z_0007755","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20251118T082040000Z_0007757","ground_truth":{"de...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250620T043612000Z_0007759","ground_truth":{"detection_guidance...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251110T113559000Z_0007761","...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20261217T005724000Z_0007763","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt41_20260221T003447000Z_0007765","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250916T192023000Z_0007767","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250809T132530000Z_0007769","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact","Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250728T001742000Z_0007771","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250710T161818000Z_0007773","ground_trut...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250817T170651000Z_0007775","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260702T061036000Z...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Impact","Collection"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260820T044441000Z_0007779","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260421T022005000Z_0007781","ground_truth":{"detection_guidance"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Exfiltration","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250916T132444000Z_0007783","ground_truth":{"detection_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Privilege Escalation","Impact"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260612T224136000Z_0007785","ground_truth":{"detection_guidance"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Lateral Movement","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261021T062454000Z_0007787","ground_truth":{"detection...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261220T035005000Z_0007789","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260217T025029000Z_0007791","ground_truth":{"detection...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250316T003949000Z_0007793","ground_truth":{"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250424T091232000Z_0007795","ground_truth":{"detection_gu...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260511T024323000Z_0007797","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Impact","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260821T232057000Z_0007799","ground_truth":{"detection...