text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Discovery","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250615T174325000Z_0001001",...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Collection","Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250123T104633000Z_00...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Lateral Movement","Initial Access"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_202...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250126T064000000Z_0001007","ground...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Persistence","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250728T094422000Z_0001009...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Discovery","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260629T222026000Z_0001011","g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Impact"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250708T195437000Z_0001013","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250717T080801000Z_0001015","ground_truth":{"detection_guidance...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250112T011116000Z_0001017","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250622T045915000Z_00010...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260616T075802000Z_0001021","ground_truth":{"dete...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20251013T171912000Z_0001023","gr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20251118T205306000Z_0001025","ground_truth":{"de...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260427T114657000Z_0001027","ground_truth":{"detection_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Exfiltration","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250923T174447000Z_0001029","ground_truth":{"de...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Exfiltration","Execution"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260403T013836000Z_0001031","ground_truth":{...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Persistence","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250407T062343000Z_0001033","ground_tr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260430T233034000Z_0001035","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260226T012401000Z_0001037","ground_truth":{"detection_guidance...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Defense Evasion","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250429T2...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Collection","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_2025...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20251112T142008000Z_0001043","ground_truth":{"de...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260531T132217000Z_0001045","ground_truth":{"detec...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Execution","Impact"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20261023T113917000Z_0001047","ground_truth":{"dete...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Impact","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260930T033336000Z_0001049","ground_truth":{"detection_g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260121T131238000Z_0001051","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250414T083602000Z_0001053","ground_truth":{"detection_guidance":...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Impact","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250928T095526000Z_0001055","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Credential Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20251117T014155000Z_0001057","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Defense Evasion","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260524T211337000Z...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260619T161403000Z_0001061","ground_truth":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260104T131031000Z_0001063","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on s...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260326T151433000Z_0001065","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260925T021755000Z_0001067","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261212T183209000Z_0001069","ground_truth":{"d...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Collection","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251006T143244000Z_00010...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Collection","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261207T060625000Z_0001073","ground_truth":{...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_apt41_20260209T221003000Z_0001075","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250615T080656000Z_0001077","ground_truth":{"detection_guid...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Initial Access","Impact"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250325T154932000Z_00...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250508T065531000Z_0001081","ground_truth":{"detect...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Privilege Escalation","Execution"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250323T234415000Z_0001083...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Privilege Escalation","Persistence"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260705T082422000Z_00010...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Defense Evasion","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250301T2008260...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250719T153437000Z_0001089","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_apt41_20260828T014852000Z_0001091","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on s...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251020T053346000Z_0001093","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250809T095054000Z_0001095","ground_truth":{"dete...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260410T092349000Z_0001097","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261007T150553000Z_0001099","ground_trut...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Reconnaissance","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250814T211627000Z_0...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Command and Control","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260807T073539000Z_000110...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251209T144702000Z_0001105","ground_truth":{"detectio...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260921T212648000Z_0001107","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Initial Access","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260211T0101...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260306T181402000Z_0001111","ground_truth":{"detection_guidance":"Sigma rule for T1071.0...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251225T055526000Z_0001113","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250605T181541000Z_0001115","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20251206T152439000Z_0001117","g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20261106T162848000Z_0001119","ground_truth":{"detec...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Execution","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_mustangp...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Collection","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260404T12...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Impact"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250422T061634000Z_0001125","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Impact"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250630T145337000Z_0001127","groun...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt29_20250624T045009000Z_0001129","ground_truth":{"detecti...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Impact","Collection"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260727T102923000Z_000...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260618T182028000Z_0001133","ground...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Discovery","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredsp...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250509T014824000Z_0001137","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Exfiltration","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250722T065443000Z_0001139","ground_truth":{"detection_guida...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250127T124308000Z_0001141","ground_truth":{"detection_guida...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260427T044...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Impact"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260303T221034000Z_0001145","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250724T174715000Z_0001147","ground_truth":{"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Collection"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250913T015449000Z_0001149","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260313T090830000Z_0001151","ground_truth":{"detectio...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260503T225305000Z_0001153","ground_t...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261214T231611000Z_0001155","ground...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Impact","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261230T155728000Z_0001157","ground_truth":{"detection_guida...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260414T192250000Z_0001159","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Command and Control","Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20261010T074...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251215T162848000Z_0001163","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250903T103549000Z_0001165...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Discovery","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251220T175032000Z_000116...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt41_20250803T002130000Z_0001169","ground_truth":{"detectio...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250309T152404000Z_0001171","ground_truth":{...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260403T15483...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Discovery","Execution"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260729T021207000Z_0001175","ground_truth":{"detect...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250303T085604000Z_0001177","ground_t...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250401T054540000Z_0001179","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250118T145511000Z_0001181","ground_truth":{"det...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Lateral Movement","Impact"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250408T105800000Z_0001185","ground_truth":{"detection_guida...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt29_20260320T080007000Z_0001187","ground_truth":{"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251217T131701000Z_0001189","ground_truth":{"det...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251213T000422000Z_0001191","ground_truth":{"detection_guidance":"Sigma rule for T1021.00...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20261230T132029000Z_0001193","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260601T112251000Z_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250609T061831000Z_0001197","ground_truth":{"detection_guidance...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Lateral Movement","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260806T020500000Z_0001...