text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Execution"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260806T145508000Z_0011601","ground_truth":{"detecti...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250130T110826000Z_0011603","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260907T175304000Z_0011605","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20261217T132004000Z_0011607","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250913T083828000Z_0011609","ground_truth":{"det...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Command and Control","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251002T012508000Z_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Privilege Escalation","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260624T140419000Z_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Command and Control","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260530T204359000Z_0011615","ground_truth":{"detection_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Persistence","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250707T102532000Z_001161...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250216T101803000Z_0011619","ground_truth"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Command and Control","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250809T001256000Z_00116...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Credential Access","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt29_20251123T045959000Z_0011623","...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Discovery","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250301T121331000Z_0011625","gro...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260407T085716000Z_0011627","g...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Impact","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250421T113507000Z_001162...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Command and Control","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260625T100640000Z_0011631","ground_truth":{"dete...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Privilege Escalation","Initial Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261201T220403000Z_0011633","...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Discovery","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261218T195046000Z_0011635","ground_truth":{"de...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Initial Access","Impact"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251105T003208000Z_0011637","ground_truth":{"dete...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Impact"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251229T165055000Z_0011639","ground_truth":{"d...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Discovery","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250402T040623000Z_0011641","ground_truth":...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250129T065528000Z_0011643","ground_t...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250606T085958000Z_0011645","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250802T114027000Z_0011647","ground_truth":{"detection_guidance...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20261009T081009000Z_0011649","ground_truth":{"detection_guida...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260728T223325000Z_0011651","ground_truth":{"detect...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Defense Evasion","Collection"],"technique_id":"T1531"},"event_id":"evt_apt41_20261223T083032000Z_0011653","ground_truth...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260226T091920000Z_0011655","ground_truth":{"dete...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Lateral Movement","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250921T201651000Z_0011657","ground_t...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260829T215555000Z_0011659","ground_truth":{"detection_guidance...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250519T094642000Z_0011661","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Initial Access","Collection"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260711T205831000Z_0011663","gr...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250711T080650000Z_0011665","ground_truth":{"dete...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Impact","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260705T120155000Z_0011667","...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Collection"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250907T154700000Z_0011669","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251010T223213000Z_0011671","ground_truth":{"detection_guidance":"Sigma rule for T1021....
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250407T143719000Z_0011673","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20260404T161338000Z_0011675","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261205T205842000Z_0011677","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Privilege Escalation","Execution"],"technique_id":"T1570"},"event_id":"evt_fin7_20250519T125738000Z_0011679","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261027T104835000Z_0011681","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260703T150330000Z_0011683","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250808T141200000Z_0011685","ground_truth":{"detection_guidance...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251126T050845000Z_0011687","ground_truth":{"de...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261231T163232000Z_0011689","ground_truth":{"detection_g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Persistence","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261031T153615000Z_0011...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20250824T094113000Z_0011693","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_fin7_20251023T043917000Z_0011695","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260719T204843000Z_0011697","ground_truth":{...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260813T182822000Z_0011699","ground_truth":{"detection_guida...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Exfiltration","Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260412T121650000Z_0011701","ground_truth":{"detect...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250504T144248000Z_0011703","ground_truth":{"detection_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250906T010118000Z_0011705","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20261226T171018000Z_0011707","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Impact","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250804T185111000Z_0011709...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Defense Evasion","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20251117T081901000Z_0011711","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260610T061545000Z_0011713","ground_truth":{"detection_guid...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Exfiltration","Command and Control"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260201T224814000Z_0011715","ground_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250829T125521000Z_0011717","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261222T021913000Z_0011719","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260919T163949000Z_0011721","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260603T153841000Z_0011723","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261107T231146000Z_0011725","ground_truth":{"detection_guida...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Impact"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250610T153740000Z_0011727","ground_truth":{"dete...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250908T000840000Z_0011729","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Privilege Escalation","Initial Access"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261017T123531000Z_0011731...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Collection"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260409T203458000Z_0011733","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20261022T003959000Z_0011735","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Joi...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261008T235151000Z_0011737","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Discovery","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250114T235441000Z_0011739","ground_truth"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20251117T195811000Z_0011741","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251225T153016000Z_0011743","ground_truth":{...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Impact","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250830T030628000Z_0011745","ground_truth":{"detection_guida...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Collection","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250910T124647000Z_0011747","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260419T174522000Z_001174...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Privilege Escalation","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_s...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260502T010751000Z_0011753","...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Persistence","Execution"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260720T2...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250926T094457000Z_0011757","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Discovery","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260819T132509000Z_0011759","ground_truth":{"detection_guidance":...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_fin7_20250114T173255000Z_0011761","ground_truth":{"dete...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20260806T211317000Z_0011763","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20261102T035717000Z_0011765","ground_truth":{"detection_guidance...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250130T143112000...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Exfiltration","Persistence"],"technique_id":"T1531"},"event_id":"evt_apt29_20260531T160442000Z_0011769","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20251019T134234000Z_0011771","ground_truth":{"detection_guidanc...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Collection","Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260713T030451000Z_0011773","ground_truth":{"detection_guidance...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Command and Control","Execution"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20251126T03...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_apt29_20250824T075316000Z_0011777","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Impact","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260610T232101000Z_0011779","gro...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Privilege Escalation","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_mustang...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Lateral Movement","Execution"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250212T194642000Z_0011783","ground_truth":{"de...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20251127T050538000Z_0011785","ground_truth":{...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260808T190347000Z_0011787","ground...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250529T204928000Z_0011789","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250226T211459000Z_0011791","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20260502T010818000Z_0011793","ground_truth":{"detection_g...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Impact","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260725T035042000Z_0011795","ground_truth"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260814T083543000Z_0011...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20251205T141848000Z_0011799","ground_truth":{"detection_guidance":"Sigma rule for T1...