text
stringlengths
1.13k
1.33k
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Privilege Escalation","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt29_20250516T062919000Z_0010001","g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260809T102031000Z_0010003","ground_truth":{"detectio...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Defense Evasion","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260305T1634570...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Defense Evasion","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251228T123119000Z_0010007","g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Execution","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260624T171117000Z_0010009","ground_truth":{"detection_guidance...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251221T171348000Z_0010011","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261104T090846000Z_0010013","ground_truth":{"detec...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_lapsus_20261209T045717000Z_0010015","ground_truth":{"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260914T011004000Z_0010017","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250919T174546000Z_0010019","gr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260503T181826000Z_0010021","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260104T211603000Z_0010023","ground_truth":{"detection_guidance...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250429T172823000Z_0010025","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250908T04502600...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250629T035746000Z_0010029","ground_truth":{"detection_gu...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Initial Access","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250319T030745000Z_0010031","ground_t...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260910T221419000Z_0010033","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260325T182357000Z_0010035","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250103T024701000Z_0010037","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260720T021427000Z_0010039","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Execution","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250219T044246000Z_0...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Collection","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260705T194815000Z_00...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251005T095026000Z_0010045","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Impact"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250120T23...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260511T073535000Z_0010049","ground_truth":{"detection_g...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Credential Access","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260213T131232000Z_0010051","ground_truth":{"detec...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251104T180321000Z_0010053","ground_truth":{"detec...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Discovery","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250529T134207000Z_0010055","groun...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250903T004048000Z_0010057","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Collection"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250121T134819000Z_0010059","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250115T193748000Z_0010061","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260525T073921000Z_0010063","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251229T005833000Z_0010065","ground_truth":{"detection_g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250629T085031000Z_0010067","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260401T221238000Z_0010069","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Credential Access","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250707T0427390...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260220T111728000Z_0010073","ground_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Command and Control"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260319T032736000Z_0010075","ground_tru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260830T024951000Z_0010077","ground_truth":{"dete...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt29_20260217T114255000Z_0010079","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260308T122119000Z_0010081","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260520T212817000Z_0010083","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Exfiltration","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261006T103944000Z_0010085","ground_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Initial Access","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261227T064008000Z_0010087","ground_truth":{"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250609T000848000Z_0010089","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261214T000536000Z_0010091","ground_truth":{"detection_gui...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Impact"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261208T000813000Z_0010093","ground_truth":{"detection_gui...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence","Lateral Movement","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260610T171447000Z_0010095","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Execution"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261119T164932000Z_0010097","ground_truth":{"d...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260911T150407000Z_0010099","ground_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261001T043910000Z_001010...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250403T053536000Z_0010103","ground_truth":...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260216T050302000Z_0010105","ground_truth":{"detection_guidance":"Sigma rule for T1098....
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Impact"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260313T070234000Z_0010107","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Impact"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250210T005053000Z_0010109","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251105T054315000Z_0010111","ground_truth"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250308T201710000Z_0010113","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260412T183952000Z_0010115","ground_truth":{"detection_guidan...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20251002T032942000Z_0010117","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260411T052629000Z_0010119","gro...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261227T092639000Z_0010121","ground_truth":{"detection_guid...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260610T230...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Defense Evasion","Discovery"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250101T134850000Z_0010125","ground_truth":{"de...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Command and Control","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250716T065433000Z_0010127","ground_truth":{"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260107T071909000Z_0010129","ground_truth":{"detectio...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260501T083045000Z_0010131","ground_truth":{"detection_guid...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250721T161916000Z_0010133","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261206T120237000Z_0010135","ground_truth":{"detection_guidan...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20251218T162505000Z_0010137","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261014T015256000Z_0010139","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260703T120107000Z_0010141"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260701T115135000Z_0010143...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Exfiltration","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260803T030654000Z_0010145","ground_truth":{"detec...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Exfiltration","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260527T190158000Z_0010147","ground_truth":{"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Credential Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260717T214744000Z_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250813T230420000Z_0010151","ground_truth":{"detectio...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250306T020917000Z_0010153","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt29_20260518T081921000Z_0010155","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250326T163033000Z_0010157","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Execution"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260809T090424000Z_0010159","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Persistence","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250421T094002000Z_0010163","ground_truth":{"detection_guidance":"Sigma rule for T1098...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261201T173749000Z_0010165","ground_truth":{"de...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251229T074741000Z_0010167","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on s...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control","Initial Access","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261119T040711000Z_0010169","ground_truth":{"detec...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Collection","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260531T050606000Z_0010171","ground_truth":{"dete...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Defense Evasion","Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260221T162255000Z_0010173","ground_truth":{"detection_gui...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Command and Control","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_202...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20261029T235356000Z_0010177","ground_truth":{"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260101T060453000Z_0010179","ground_truth":{"detection_guidance":"Sigma rule for T1021.006...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260327T100254000Z_0010181","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Privilege Escalation","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250524T164728000Z_0010183",...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260608T013837000Z_0010185","ground_truth":{"detection_guidance":"Sigma rule for T1071...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Discovery","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260517T153246000Z_0010187","ground_truth":{"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Impact","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20251117T183553000Z_0010189","ground_truth":{"de...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20260217T061210000Z_0010191","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250710T170744000Z_0010193","ground_truth":{"dete...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Impact","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260613T185651000Z_0010195","ground_truth":{"detection_guidance...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260608T130802000Z_0010197","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Exfiltration","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20261005...