text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence","Privilege Escalation","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250122T060908000Z_0008801","ground_tru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Execution","Collection"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250520T005747000Z_000880...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Execution"],"technique_id":"T1570"},"event_id":"evt_fin7_20251012T174902000Z_0008805","ground_truth":{"detection_guidance":"Sigma rule for T1570...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250904T154431000Z_0008807","ground_truth":{"detection_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Reconnaissance","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260126T003046000Z_0008809"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260519T004848000Z_0008811","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Privilege Escalation","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250916T235152000Z_0008815","ground_truth":{"detection_gu...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250517T201745000Z_0008817","ground_truth":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Collection","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251126T2...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260509T074752000Z_0008821","gro...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250625T003601000Z_0008823","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Credential Access","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260128T172044000Z_0008825","groun...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Impact","Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250819T215548000Z_0008827","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Command and Control","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260119T061036000Z...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261221T000020000Z_0008831","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250429T000904000Z_0008833","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260422T233450000Z_0008835","gro...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Lateral Movement","Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260726T230130...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Lateral Movement","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250222T161649000Z_0008...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Impact","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250717T133612000Z_00088...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260212T141111000Z_0008843",...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20261214T162242000Z_0008845","ground_truth":{"de...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250113T075439000Z_0008847","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250104T102213000Z_0008849","ground_truth":{"detection_guidance":"Sigma rule for T1021.006...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Discovery","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260915T155520000Z_0008851","ground_truth":{"detection_guida...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Lateral Movement","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260927T172214000Z_0008853","ground_truth...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Persistence","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251007T003108000Z_00088...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Credential Access","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250307T204508000Z_0008857","grou...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Credential Access","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251205T085904000Z_00...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_2025032...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Execution","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260307T071414000Z_0008...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Collection","Execution"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250113T053902000Z_0008865","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260829T153016000Z_0008867","gro...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Reconnaissance","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251206T0220...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Command and Control","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250611T083824000Z_0008871","...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260113T002925000Z_0008873","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection","Reconnaissance","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260201T170124000Z_0008875","ground_truth":{"detection_guidance...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Command and Control","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251223T200050000Z_0008877","ground_truth":{"detection_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20261203T124608000Z_0008879","groun...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Credential Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20261127T073715000Z_0008881","g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260113T013417000Z_0008883","ground_truth":{"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250525T183043000Z_0008885","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Privilege Escalation","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250210T115321000Z_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Execution","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250615T082851000Z_000...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence","Initial Access","Execution"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250812T182203000Z_0008891","ground_truth":{"detect...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Discovery","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260712T012300000Z_0008893","gr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250131T093247000Z_0008895","ground_truth":{"detection_guid...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250409T101515000Z_0008897","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261227T182056000Z_0008899","ground_truth...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20261107T233921000Z_0008901","gro...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260505T175313000Z_0008903","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Defense Evasion","Execution"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_2025120...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250106T044411000Z_0008907","gro...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250128T233733000Z_0008909","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Collection"],"technique_id":"T1570"},"event_id":"evt_fin7_20250111T022146000Z_0008911","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Impact"],"technique_id":"T1570"},"event_id":"evt_fin7_20251116T042743000Z_0008913","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260505T030428000Z_0008915","ground_truth":{"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260117T020448000Z_0008917","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt41_20250321T153225000Z_0008919","ground_truth":{"det...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260804T014703000Z_0008921","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260308T193508000Z_0008923","ground_truth":{"detect...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251008T041303000Z_0008925","gr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250422T180406000Z_0008927","ground_truth":{"detection_g...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250224T022535000Z_0008929","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251119T032445000Z_0008931","ground_truth":{"detecti...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Credential Access","Impact"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250325T065303000Z_0008933","ground_tr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Collection","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250508T140221000Z_0008935","grou...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt41_20250724T223021000Z_0008937","ground_truth":{"de...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20250414T235455000Z_0008939","ground_truth":{"detectio...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Privilege Escalation","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20261013T022646000Z_0008941","ground_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Collection","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250209T065416000Z_0008943","groun...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260301T133051000Z_0008945","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260110T230947000Z_0008947","ground_truth":{"detection_guidan...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250821T151423000Z_000894...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250418T171523000Z_0008951","ground_truth":{"detection_guida...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260514T161242000Z_0008953","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Collection"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260827T193928000Z_0008955","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Collection","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261112T135709...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Persistence","Execution"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20261015T150757000Z_0008959","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Command and Control","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250914T191845000Z_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Discovery","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250311T032641000Z_0008963","ground_truth":{"de...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection","Command and Control","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260609T075015000Z_0008965","ground_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Credential Access","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260622T010648000Z_0008967","ground_truth"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Privilege Escalation","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250412T223535000...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Reconnaissance","Persistence"],"technique_id":"T1531"},"event_id":"evt_lapsus_20261224T043142000Z_0008971","ground_trut...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250302T120753000Z_0008973","ground_truth":{...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250323T101259000Z_0008975","ground_truth":{"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Collection","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250422T0...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260803T135245000Z_0008979","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260505T050620000Z_0008981","ground_truth":{"detect...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261224T072248000Z_0008983","ground_truth":{"detection_guidance":"Sigma rule for T1021.00...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250129T003757000Z_0008985","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Defense Evasion","Execution"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250825T050133000Z_0008987","ground_truth":{"detection...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261208T031559000Z_0008989","gr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Collection"],"technique_id":"T1531"},"event_id":"evt_fin7_20250305T223051000Z_0008991","ground_truth":{"detection_guid...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260908T115353000Z_0008993","ground_truth":{"detection_gu...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Exfiltration","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250530T224930000Z...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260624T063303000Z_0008997","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Lateral Movement","Execution"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251012T125103000Z_0008999","ground_...