text
stringlengths
1.13k
1.33k
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Persistence","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260218T065125000Z_0011801","ground_truth":{"detection_guid...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Initial Access","Persistence"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260117T091442000Z_00...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Reconnaissance","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260403T001252000Z_0011805","ground_truth":{"detection_gui...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251118T222549000Z_0011807","ground_truth":{"detec...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250803T104222000Z_0011809","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Collection","Initial Access"],"technique_id":"T1570"},"event_id":"evt_fin7_20260827T033421000Z_0011811","ground_truth":{"detection_guidan...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261114T201918000Z_0011813","ground_truth":{"detection_guidance":...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250727T091019000Z_0011815","ground_truth"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Defense Evasion","Collection"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250118T151400000Z_0011817","ground_truth":{"detecti...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Persistence","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260309T115056000Z_0011819","groun...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Defense Evasion","Execution"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250916T181029000Z_0011821","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251117T025609000Z_0011823","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Reconnaissance","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250425T214633000Z_00...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261005T134813000Z_0011827","ground_truth":{"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260821T033043000Z_0011829","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Impact"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250708T211937000Z_0011831","ground_tr...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250414T131102000Z_0011833","ground_t...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_fin7_20261122T151229000Z_0011835","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250718T085303000Z_0011837...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Initial Access","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260630T194210000Z_0011839","ground_truth":{"detec...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Command and Control","Execution"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260404T062515000Z_0011841","grou...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Reconnaissance","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260903T211135000Z_0011843","groun...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_fin7_20260207T143153000Z_0011845","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260809T160305000Z_0011847","ground_truth":{"detectio...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Execution"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250907T123420000Z_0011849","ground_truth":{"detection...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260924T115852000Z_0011851","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | J...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260913T011154000Z_0011853","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Execution","Collection"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261212T224427000Z_0011855","ground_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260110T191554000Z_0011857","ground_truth":{"detection_guidance":...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250824T144403000Z_0011859","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260110T222355000Z_0011861","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Joi...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260316T135358000Z_0011863","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_fin7_20250411T052313000Z_0011865","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Discovery","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251127T231339000Z_0011867",...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250704T200824000Z_0011869","ground_truth":...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Lateral Movement","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250112T094309000Z_0011871","ground_truth":{"dete...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250129T232151000Z_0011873","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260925T0421...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250925T132230000Z_0011877","ground_truth":{"det...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Impact"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20261030T151821000Z_0011879","ground_truth":{"detection_gu...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250108T075405000...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Lateral Movement","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_2026081...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260522T065154000Z_0011885","ground_truth":{"dete...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250112T211457000Z_0011887","ground_truth":{"detectio...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260809T082712000Z_0011889","ground_truth":{"d...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_apt29_20260305T092039000Z_0011891","ground_truth"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20251201T021654000Z_0011893","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260217T080807000Z_0011895","ground_t...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260825T092003000Z_0011897","gr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260606T151134000Z_0011899","ground_truth":{"detection_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260422T105438000Z_0011901","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251003T110636000Z_0011903"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260608T042152000Z_0011905","ground_truth":{"detection_guidance...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260208T035335000Z_0011907","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250713T124057000Z_0011909","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Impact","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260918T1647...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_fin7_20260927T203514000Z_0011913","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Impact"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251025T224922000Z_0011915","ground_tr...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Impact"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250525T010954000Z_0011917","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Privilege Escalation","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251103...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Collection","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261101T142209000Z_0011921"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260701T112634000Z_0011923","ground_truth":{"detection_guidan...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Credential Access","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260630T185701000Z_0011925","ground_truth"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Initial Access","Reconnaissance","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250917T004644000Z_0011927","ground_truth"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Defense Evasion","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_sc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260916T040713000Z_0011931","ground_truth":{"d...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260117T195038000Z_0011933","ground_truth":{"detectio...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250107T132853000Z_00...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261222T044735000Z_0011937","ground_truth":{"detection_guidance":"Sigma rule for T1021....
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251120T191009000Z_0011939","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250626T111955000Z_0011941","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250130T135928000Z_0011943","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20251215T191527000Z_0011945","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261213T140539000Z_0011947","ground_truth":{"detection_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260606T185748000Z_0011949","ground_truth":{"detection_guida...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Defense Evasion","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20251231T170542000Z_00119...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Persistence","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250119T014220000Z_0011953","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Credential Access","Command and Control"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260928T231423000...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250125T170759000Z_0011957","ground_truth":{"detect...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250609T102134...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260327T104929000Z_0011961","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250321T000629000Z_0011963","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Lateral Movement","Impact"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250418T155005000Z_001196...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250129T090725000Z_0011967","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260219T235756000Z_0011969","ground_truth":{"detection_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250816T094120000Z_0011971","ground_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250731T165910000Z_0011973","ground_truth":{...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_fin7_20260715T192838000Z_0011975","ground_truth":{"detection_guidance":"Sigma rule for T1570 |...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251206T171009000Z_0011977","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20261030T235440000Z_0011979","g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Impact","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250324T030910000Z_0011981","ground_truth":{"det...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260925T065031000Z_0011983","ground_t...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251126T113656000Z_0011985","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250416T032506000Z_0011987","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Collection"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261216T215723000Z_0011991","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Execution"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250716T080934000Z_0011993","ground_truth":{"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Execution","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250421T084441000Z_0011995...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260212T001157000Z_0011997","ground...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250329T125229000Z_0011999","ground_truth":{"d...