text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250525T000000000Z_0009801","ground_truth":{"detection_g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Initial Access","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20251227T172532000Z...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Initial Access","Collection"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250526T113301000Z_0009805","ground_truth"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Execution"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250224T180313000Z_0009807","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Command and Control","Impact"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251222...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250805T014755000Z_0009811","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20251117T163749000Z_0009813","grou...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_apt41_20250206T120438000Z_0009815","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260818T040816000Z_0009817","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Lateral Movement","Impact"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260329T060218000Z...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250814T052848000Z_0009821","groun...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution","Privilege Escalation","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260301T180251000Z_0009823","ground_truth":{"detection...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20261117T232601000Z_0009825","ground_truth":{"detection_guidance":"Sigma rule for T15...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Persistence"],"technique_id":"T1570"},"event_id":"evt_apt29_20260102T142956000Z_0009827","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20261206T034158000Z_0009829","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261008T074756000Z_0009831","ground_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Execution"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250609T180339000Z_0009833","ground_truth":{"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250525T033425000Z_0009835","ground_truth":{"detection_g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Initial Access","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_fin7_20260410T014353000Z_0009837"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250112T180517000Z_0009839","ground_truth":{"detec...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Impact"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260328T040807000Z_00098...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access","Defense Evasion","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250224T205410000Z_0009843","ground_truth":{"detection_gu...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Defense Evasion","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250903T045451000Z_0009845","ground_truth":{"detection_guidance...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Collection"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260728T070524000Z_0009847","ground_truth":{"detection_g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250322T192403000Z_0009849","ground_truth":{"detection_guidan...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Command and Control","Collection"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261111T133921000Z_00098...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt41_20250624T155031000Z_0009853","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260817T063502000Z_0009855","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250315T032318000Z_0009857","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251102T201311000Z_0009859","ground_truth":{"detection_guidance":"Sigma rule for T1059.00...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250820T211252000Z_0009861","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Lateral Movement","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt29_20250917T210558000Z_0009863","ground_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250305T044550000Z_0009865","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Command and Control","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250827T184625000Z_0009867","ground_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Persistence","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261007T1318050...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251120T112836000Z_0009871","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Exfiltration","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261216T000716000Z_0009873","ground_truth":{"detection_guidance...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Execution"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260904T033939000Z_0009875","ground_truth":{"detec...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Lateral Movement","Impact"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251025T174926000Z_0009877","ground_truth":{"detection_guidan...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260207T211610000Z_0009879","ground_truth":{"d...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251229T030320000Z_0009881","ground_truth":{"detection_guidan...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261023T044932000Z_0009...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Exfiltration","Collection"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260226T060641000Z_0009885","ground_truth":{"detectio...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261010T060931000Z...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Execution"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261125T205323000Z_0009889","ground_truth":{"detection_gu...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260830T012955000Z_0009891","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Execution","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250622T155505000Z_0009893","ground_truth":{"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Impact","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250822T113802000Z...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20250923T143026000Z_0009897","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261014T045631000Z_0009899","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260615T184417000Z_0009901","ground_truth":...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Discovery","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250508T032031000Z_0009903","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250626T222022000Z_0009905","ground_truth":{"detection_guidance":"Sigma rule for T109...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260820T081541000Z_0009907","ground_truth":{"detection_guid...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Persistence","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250301T210858000Z_0009909","ground_truth":{"de...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Command and Control","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260713T0359...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260422T050701000Z_0009913","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260424T003714000Z_0009915","ground_truth":{"detection_guidanc...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_fin7_20250325T130558000Z_0009917","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260608T161004000Z_0009919","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Impact","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250728T01575...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Collection"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250209T211855000Z_0009923","ground_truth"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260603T095451000Z_0009925","ground_tru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250727T190654000Z_0009927","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250414T234122000Z_0009929","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260605T235653000Z_0009931","ground_tr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Collection"],"technique_id":"T1570"},"event_id":"evt_apt41_20260720T051049000Z_0009933","ground_truth":{"detection_guidance":"Sigma rule for T1570...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250120T133925000Z_0009935","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Command and Control","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260316T074343000Z_0009937","grou...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Credential Access","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt29_20261225T214139000Z_0009939","ground...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261104T212403000Z_0009941",...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_fin7_20260621T065101000Z_0009943","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20251130T110816000Z_0009945","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Collection","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260611T0700...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250907T081954000Z_0009949","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260330T104517000Z_0009951","ground_truth":{"detection_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250624T024646000Z_0009953","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260313T180524000Z_0009955","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Credential Access","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_fin7_20250304T202455000Z_0009957","ground_truth":{"detec...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260204T110210000Z_0009959","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260507T074320000Z_0009961","ground_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251108T094511000Z_0009963","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Collection","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_202...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Exfiltration","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250606T025613000Z_000996...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261031T132938000Z_0009969","ground_truth":{"detection_gui...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260915T174103000Z_0009971","ground_trut...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Command and Control"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250305T033450000Z_0009973","ground_truth":{"de...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Collection"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20261206T185051000Z_0009975","ground_truth":{"dete...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Collection"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250201T154436000Z_0009977","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Execution"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20261030T104145000Z_0009979","ground_t...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261216T083913000Z_0009981","ground_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261219T041024000Z_0009983","ground_truth":{"detection_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260309T111533000Z_0009985","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Reconnaissance","Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250114T013...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250627T020654000Z_0009989","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250108T143453000Z_0009991","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260612T224703000Z_0009993","ground_truth":{"detection_guidance":"Sigma rule for T1570...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Credential Access","Discovery"],"technique_id":"T1531"},"event_id":"evt_fin7_20260106T022356000Z_0009995","ground_t...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Execution"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251017T042624000Z_0009997","ground_truth":{"detection_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_fin7_20260608T142150000Z_0009999","ground_truth":{"detection_...