text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Credential Access","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250502T221509000Z_0011403","gr...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Privilege Escalation","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251004T102720000Z_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Collection","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261206T153714000Z_0011407","ground_truth":{"detection_gu...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Execution","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260323T005755000Z_0011409","ground_truth":{"detection_guidanc...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Exfiltration","Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250720T202051000Z_0011411","ground_truth":{"detection_guid...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261102T172927000Z_0011413","ground_truth":{"detection_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250731T161745000Z_0011415","ground_truth":{"detection_guid...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Impact"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260125T160825000Z_0011417","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251117T023434000Z...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20251008T195254000Z_0011421","ground_truth":{"detection_gu...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Credential Access","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt41_20251225T092512000Z_0011423","ground_truth":{"detection_g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260409T045717000Z_0011425","ground_truth":{"detection_guidance":"Sigma rule for T1071.00...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260320T10452...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260710T024604000Z_0011429","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Persistence","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20260805T051328000Z_0011431","ground_tr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250620T101554000Z_0011433","ground_truth":{"detection_gu...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Exfiltration","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260326T182320000Z_0011437","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260918T142148000Z_0011439","grou...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250304T080407000Z_0011441","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Defense Evasion","Command and Control"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261002T153937000Z_00...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Execution","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260209T173953000Z_0011445","ground_truth":{"detec...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20261128T024604000Z_0011447","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250918T182138000Z_0011449","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Command and Control"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250302T031818000Z_0011451"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260704T193040000Z_0011453","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join o...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20261127T085905000Z_0011455","ground_truth":{"detection_gu...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Execution","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20261015T202331000Z_0011457","gro...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Persistence","Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20261101T223354000Z_0011459","ground_t...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260730T224320000Z_0011461","ground_truth":{"detection_gui...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Impact"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260328T060652000Z_0011463","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260531T131019000Z_0011465","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261113T083410000Z_0011467","ground_truth":{"de...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Execution"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250923T223834000Z_0011469","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260801T032808000Z_0011471","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261003T183148000Z_0011473","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Execution","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250702T0...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Credential Access","Impact"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260914T150056000Z_0011477...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250425T113227000Z_0011479","ground_truth":{"detection_guida...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Execution","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261223T215127000Z_0011481","groun...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Discovery","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250606T194137000Z_0011483","...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Impact","Persistence"],"technique_id":"T1531"},"event_id":"evt_apt29_20251031T122541000Z_0011485","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Execution","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260415T01312500...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261018T135548000Z_0011489","ground_truth":{"detection_guidance":"Sigma rule for T1059....
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20251020T104111000Z_0011491","ground_truth":{"detec...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251228T214517000Z_0011493","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260615T045743000Z_0011495","ground_truth"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250625T062230000Z_0011497","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250509T001330000Z_0011499","ground_trut...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260508T125928000Z_0011501","ground_truth":{"detection_g...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260606T151234000Z_0011503","ground_truth":{"detection_guidance"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Persistence","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260515T185735000Z_0011505","ground_t...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Execution","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250225T131144000Z_0011507","gr...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261212T065108000Z_0011509","g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250425T231921000Z_0011511","ground_truth":{"de...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Reconnaissance","Execution"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260314T020431000Z_0011513","ground_truth":{"detectio...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260128T173219000Z_0011515","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Persistence","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260303T073436000Z_0011517","ground_tr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260718T005419000Z_0011519","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20251218T202936000Z_0011521","ground_truth":{"detection_g...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20261017T103315000Z_0011523","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250404T054739000Z_00...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20251003T094354000Z_0011527","ground_truth...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261222T075618000Z_0011529","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260617T034232000Z_0011531","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260427T053941000Z_0011533","ground_truth":{"detecti...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251105T...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250116T184134000Z_0011537","gr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250701T082026000Z_0011539","ground_truth":{"detection_g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Impact"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250120T025902000Z_0011541","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence","Exfiltration","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260331T153517000Z_0011543","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Lateral Movement","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250724T080711000Z_0011545","ground_trut...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260105T015425000Z_0011547","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250319T015309000Z_0011549","ground_truth":{"detection_guidance":"Sigma rule for T1071...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Initial Access","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260704T084000000Z_0011551","ground_truth":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Reconnaissance","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260129T110745000Z_0011553","ground_truth"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260320T143511000Z_0011555","ground_truth":{"detection_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250926T111020000Z_0011557","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Privilege Escalation","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250216T073125000Z_0011...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Lateral Movement","Impact"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260924T050903000Z_0011561","ground_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Credential Access","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20251120T033452000Z_0011563","ground_tr...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Persistence","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261016T154252000Z_0011565","ground_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Impact","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20251105T205706000...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260220T140732000Z_0011569","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Privilege Escalation","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250521T181310000Z_0011571","g...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Initial Access","Impact"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250414T070817000Z_0011573","ground_truth":{"detection_g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250320T204137000Z_0011575","ground_truth":{"d...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260929T211223000Z_0011577","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Impact","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260615T1720...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Privilege Escalation","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260409T015405...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Privilege Escalation","Execution"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260314T143300000Z_0011583","ground_truth":{"detection_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20251201T081955000Z_0011...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Persistence","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250519T043455000Z_0011587","groun...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Impact"],"technique_id":"T1531"},"event_id":"evt_fin7_20250404T023235000Z_0011589","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260124T110533000Z_0011591","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250410T075531000Z_0011593","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250403T163413000Z_0011595","ground_truth"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Defense Evasion","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_scatte...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260113T114220000Z_0011599","ground_truth":{"detection_guid...