text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Persistence"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251015T201327000Z_0009401","ground_truth":{"detection_g...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260915T182324000Z_0009403","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250905T062151000Z_0009405","ground_truth":{"detection_gu...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250424T230651000Z_0009407","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260622T015753000Z_0009409","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250105T124426000Z_0009411","gro...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250121T000316000Z_0009413","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Exfiltration","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260314T004253000Z_0009415","ground_truth"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Impact"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250522T181733000Z_0009417","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260303T190008000Z_0009419","ground_truth":{"detection_guidance":...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250130T102853000Z_0009421","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251011T052929000Z_0009423","ground_truth"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Execution"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260101T045644000Z_0009425","ground_truth":{"detection_gui...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_apt29_20260314T091113000Z_0009427","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250401T044131000Z...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_2025041...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260418T142915000Z_0009433","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Collection","Credential Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250314T055429000Z_0009435","ground_t...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260816T031114000Z_0009437","ground_truth":{"detection_guida...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Impact","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_fin7_20250424T225906000Z_0009439","ground_truth...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Impact"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250817T112232000Z_0009441","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260705T231705000Z_0009443","ground_truth":{"det...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261222T192050000Z_0009445","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Defense Evasion","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_musta...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250214T212622000Z_0009449","ground_truth":{"detection_g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Collection"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250127T081050000Z_0009451","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt41_20260704T020852000Z_0009453","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Persistence","Command and Control"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260621T17565800...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Privilege Escalation","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251004T024900000Z_0009457","ground_truth":{"detection_gui...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Initial Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260227T152649000Z_0009459","ground_truth":{"detection_guid...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Persistence","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250911T173131000Z_0009461","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Collection","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260304T135221000Z_0009463","ground_truth":{"detection_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250516T120859000Z_0009465","ground_truth"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250610T162033000Z_0009467","groun...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260614T043136000Z_0009469","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260908T042316000Z_0009471","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250402T103246000Z_0009473","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Execution","Credential Access"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_2025031...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250321T11...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250506T172257000Z_0009479","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Initial Access","Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250320T131548000Z_0009481","ground_truth":{"detect...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Persistence","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250416T030238000Z_0009...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Command and Control","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250909T162729000Z_0009485","ground_truth":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250211T051551000Z_0009487","ground_truth":{"detection_guidance...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Exfiltration","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260224T162446000Z_0009489","ground_truth":{"detec...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260701T100220000Z_0009491","ground_truth":{"detection...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Lateral Movement","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260331T013109000Z_0009493","ground_truth":{"detection...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260310T231531000Z_0009495","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260130T0902420...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250420T052728000Z_0009499","ground_truth":{"detection_guid...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Initial Access","Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260118T202655000Z_0009501","ground_truth":{"d...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Execution","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260201T132202000Z...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Defense Evasion","Impact"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251207T200827000Z_0009505",...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Exfiltration","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260515T071536000Z_0009507","ground_truth":...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Privilege Escalation","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250804T170232000Z_0009509","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Initial Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261113T141737000Z_0009511","ground_truth":{"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Lateral Movement","Execution"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260527T204603000Z_0009515","ground_truth":{"detection_g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Privilege Escalation","Initial Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250602T204656000Z_00...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250704T134549000Z_0009519","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250217T065859000Z_0009521","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20260901T182929000Z_0009523","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Exfiltration","Collection"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250211T122113000Z_0009525","ground_truth...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Impact","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251113T000528000Z_0009527","ground_tru...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250525T045437000Z_000952...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260702T114309000Z_000953...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Execution","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260111T0324130...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Execution","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250115T225022000Z_0009535","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250106T034822000Z_0009537","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20261205T222616000Z_0009539","ground_truth":{"d...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Privilege Escalation","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_2...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Impact","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260909T052301000Z_0009543","ground_tru...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260402T001259000Z_0009545","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260217T225251000Z_0009547","ground_truth":{"detectio...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250919T070310000Z_0009549","ground_truth":{"detecti...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250529T211223000Z_0009551","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261228T123642000Z_0009553","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250419T070419000Z_0009555","ground_truth":{"detection_gui...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260920T212652000Z_0009557","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Collection","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260927T085704000Z_0009559","ground_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261207T133317000Z_0009561","ground_truth":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Collection","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250427T101226000Z_0009563","ground_tr...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251107T230257000Z_0009565","ground_truth":{"detection_g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Collection"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260711T072700000Z_0009...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Command and Control","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260131T192710000Z_0009569","ground_truth":{"detection_guidan...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Reconnaissance","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250216T132202000Z_0009571","ground_truth":{"detection...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261218T132203000Z_0009573","ground_truth":{"d...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Persistence","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260328T094918000Z_000...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Discovery","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260125T23...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260317T072442000Z_0009579","ground_truth"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Lateral Movement","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260224T130808000Z_0009581","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution","Exfiltration","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260328T012253000Z_0009583","ground_tr...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250420T114251000Z_0009...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250102T163549000Z_0009587","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260412T113714000Z_0009589","ground_t...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20260509T192341000Z_0009591","ground_truth":{"detection_gu...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250507T200656000Z_0009593","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250521T234026000Z_0009595","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Impact","Initial Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250219T075327000Z_0009597","g...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260720T004424000Z_0009599","ground_truth...